Spy Trojan

Trojan-Spy.Win32.Stealer.bcic (file analysis)

Malware Removal

The Trojan-Spy.Win32.Stealer.bcic is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.bcic virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • At least one process apparently crashed during execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Detects Sandboxie through the presence of a library
  • Detects Avast Antivirus through the presence of a library
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Checks for the presence of known windows from debuggers and forensic tools
  • Created a process from a suspicious location
  • CAPE detected the OnlyLogger malware family
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Attempts to disable Windows Defender
  • Attempts to modify Windows Defender using PowerShell
  • Attempts to execute suspicious powershell command arguments
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan-Spy.Win32.Stealer.bcic?


File Info:

name: B879D06D2EDB37001D02.mlw
path: /opt/CAPEv2/storage/binaries/5053fe8ed01148304248df4e3edae2344ab4e9019f30fe6b894b7256cbaf28c1
crc32: 1EE1630A
md5: b879d06d2edb37001d0269dd3dbda7bf
sha1: 71ec140fb06073ea982858c767d9aa371e559e53
sha256: 5053fe8ed01148304248df4e3edae2344ab4e9019f30fe6b894b7256cbaf28c1
sha512: fe0e32ad08da297cd44ee64a5eb39aa75ad146504b7abe41d68e775094df05eda5ec10f638ddec9ed66b75fc0aa98b07cee0beb1eb002bafc1ff63b30c6aaee5
ssdeep: 196608:xTNjk8pY/a2g+G8MJ/yMeM/rtZy9CLKedho8zRY+AZ1yXL6iK3ZSkwo5u+:xBjDpIar+GXJKG/RZy9C9dhLzRY+AZ1n
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19686335077F000BBC5521CB567583BF2A6BD5225093A81F329D0E46DAFBDC2166B28BF
sha3_384: 3b1130f4fff213f7e965aba624b566d5a762e423d06f5926f55ed642db8cafd856fa30cf6caf82f790cc3964d111e509
ep_bytes: 558bec6aff6898c24100680691410064
timestamp: 2019-02-21 16:00:00

Version Info:

CompanyName: Igor Pavlov
FileDescription: 7z Setup SFX
FileVersion: 19.00
InternalName: 7zS.sfx
LegalCopyright: Copyright (c) 1999-2018 Igor Pavlov
OriginalFilename: 7zS.sfx.exe
ProductName: 7-Zip
ProductVersion: 19.00
Translation: 0x0409 0x04b0

Trojan-Spy.Win32.Stealer.bcic also known as:

LionicTrojan.Win32.Stealer.l!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Jaik.49613
FireEyeGen:Variant.Jaik.49613
CAT-QuickHealBackdoor.ManuscrypRI.S26374020
McAfeeArtemis!B879D06D2EDB
CylanceUnsafe
SangforSpyware.Win32.Stealer.bcic
K7AntiVirusTrojan-Downloader ( 0058c0b81 )
BitDefenderGen:Variant.Jaik.49613
K7GWTrojan-Downloader ( 0058c0b81 )
Cybereasonmalicious.d2edb3
CyrenW32/MSIL_Troj.CY.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32multiple detections
Paloaltogeneric.ml
ClamAVWin.Dropper.Pswtool-9857487-0
KasperskyTrojan-Spy.Win32.Stealer.bcic
AlibabaTrojanSpy:Win32/Stealer.ba99c09e
NANO-AntivirusRiskware.Win32.PSWTool.hqsnsl
TencentWin32.Trojan.Multiple.Pgcv
Ad-AwareGen:Variant.Jaik.49613
EmsisoftGen:Variant.Jaik.49613 (B)
ComodoApplicUnwnt@#1oskvm236onaf
DrWebTrojan.PWS.Siggen3.10988
TrendMicroTROJ_GEN.R002C0WAN22
McAfee-GW-EditionBehavesLike.Win32.Generic.wc
SophosMal/Generic-R
JiangminTrojan.PSW.Stealer.aju
AviraHEUR/AGEN.1235880
MAXmalware (ai score=82)
Antiy-AVLTrojan/Generic.ASMalwS.35248AF
MicrosoftTrojan:Win32/Raccrypt.GP!MTB
GridinsoftRansom.Win32.STOP.sa
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Jaik.49613
CynetMalicious (score: 100)
BitDefenderThetaGen:NN.ZexaF.34212.KqX@am0ccv
ALYacGen:Variant.Jaik.49613
VBA32BScope.TrojanBanker.ChePro
MalwarebytesTrojan.MalPack
TrendMicro-HouseCallTROJ_GEN.R002H0CB822
RisingTrojan.Starter!1.D93D (CLASSIC:E0:azfKBk1fj7N)
IkarusTrojan-Downloader.MSIL.Agent
FortinetMSIL/Agent.JVN!tr.dldr
AVGWin32:Trojan-gen
AvastWin32:Trojan-gen

How to remove Trojan-Spy.Win32.Stealer.bcic?

Trojan-Spy.Win32.Stealer.bcic removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment