Spy Trojan

Trojan-Spy.Win32.Stealer.azld information

Malware Removal

The Trojan-Spy.Win32.Stealer.azld is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.azld virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • NtSetInformationThread: attempt to hide thread from debugger
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Checks for the presence of known windows from debuggers and forensic tools
  • CAPE detected the RedLine malware family
  • Checks for the presence of known devices from debuggers and forensic tools
  • Detects VirtualBox through the presence of a device
  • Binary compilation timestomping detected

How to determine Trojan-Spy.Win32.Stealer.azld?


File Info:

name: AFFBE6B2C3C9EE7F0BD9.mlw
path: /opt/CAPEv2/storage/binaries/8e7ac94e4919fc4440e620ae95586b7b1984b520540f06e6c1bec297a32df876
crc32: 57D1F60D
md5: affbe6b2c3c9ee7f0bd9a7e125dc955d
sha1: ec9e0f1df7929cb788a87b1961b59940fdab3d45
sha256: 8e7ac94e4919fc4440e620ae95586b7b1984b520540f06e6c1bec297a32df876
sha512: 2ff136ea4d1354f5fb96a3b775b03f0faf8d788e4e8c0a1f21db2f18c233ecc47565b501f5332a562e91677d2ace1fdd0d3273e0988660e5646ed7e037fd9aae
ssdeep: 12288:2dCl+tkYkum8yQaawYGQDElS2ZzzAIoLY2O67b6LrhY:6VkYt4abGQDElS2Z/AIuVv6fhY
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T151C41206FE9596EBC52314F50AFAE324A632AF5A090DD59FF390BF471D762C9E841023
sha3_384: 702d39b012cadd26bcafa6e3a912aae4b1485554d41f0105f750a45d85b02a555b03828e9377ec525facf3ce21b470d9
ep_bytes: eb052a9a907af850eb0181e812000000
timestamp: 2055-10-27 09:38:38

Version Info:

0: [No Data]

Trojan-Spy.Win32.Stealer.azld also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.38753446
FireEyeGeneric.mg.affbe6b2c3c9ee7f
McAfeeArtemis!AFFBE6B2C3C9
CylanceUnsafe
ZillyaTrojan.Stealer.Win32.21496
SangforSuspicious.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaMalware:Win32/km_24aa160.None
BitDefenderThetaGen:NN.ZexaF.34212.JqZ@a8FYupai
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Packed.Obsidium.FQ
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Malware.Fruw-9938025-0
KasperskyTrojan-Spy.Win32.Stealer.azld
BitDefenderTrojan.GenericKD.38753446
TencentWin32.Trojan-spy.Stealer.Lsvz
Ad-AwareTrojan.GenericKD.38753446
ComodoMalware@#1lwmgzc0n8xtq
DrWebTrojan.PWS.Siggen3.10707
TrendMicroTROJ_GEN.R002C0WB122
EmsisoftTrojan.GenericKD.38753446 (B)
IkarusTrojan.Win32.Obsidium
AviraTR/Spy.Stealer.qjmcd
KingsoftWin32.Heur.KVMH015.a.(kcloud)
GridinsoftRansom.Win32.Wacatac.sa
ViRobotTrojan.Win32.Z.Stealer.584368
GDataTrojan.GenericKD.38753446
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.R469293
VBA32BScope.Trojan.Wacatac
ALYacTrojan.GenericKD.38753446
MAXmalware (ai score=88)
MalwarebytesTrojan.MalPack.Obsidium
TrendMicro-HouseCallTROJ_GEN.R002C0WB122
RisingSpyware.Stealer!8.3090 (CLOUD)
SentinelOneStatic AI – Malicious PE
FortinetPossibleThreat.MU
Cybereasonmalicious.df7929
PandaGeneric Suspicious

How to remove Trojan-Spy.Win32.Stealer.azld?

Trojan-Spy.Win32.Stealer.azld removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment