Spy Trojan

Trojan-Spy.Win32.Stealer.vqk removal

Malware Removal

The Trojan-Spy.Win32.Stealer.vqk is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.vqk virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (3 unique times)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Ukrainian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Attempts to identify installed AV products by installation directory
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
iplogger.org
leatherbond.top

How to determine Trojan-Spy.Win32.Stealer.vqk?


File Info:

crc32: 2B9CFA03
md5: 7e627a2036d185712606530fe642cae3
name: 7E627A2036D185712606530FE642CAE3.mlw
sha1: c209888e5964ecce9d0f72acd68d33cb27d78f5f
sha256: 0d7238358839c038b9a3363cb2d82c029178c7133c85531e91e1b5edeef265c6
sha512: fbb83d7fdaac6340697149815d228ad2c31e5b1b4b302c433062a5cd93281db5f45b1db36025be5b2f94f5d6ecdebfb0101a81f0487fd3609848abb4df75ff82
ssdeep: 12288:Mp9UZe4mjw5Dc/0SXAq86XmsqJTiZBjF5kj:YGZe4mkNnSX186XmJ+ZBjF5kj
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

InternalSurname: debaukd.ekze
Product: 1.7.7
FileVersions: 1.0.5.6
LegalCo: Copyri (C) 2019, permudationz

Trojan-Spy.Win32.Stealer.vqk also known as:

Elasticmalicious (high confidence)
DrWebTrojan.MulDrop16.3346
FireEyeGeneric.mg.7e627a2036d18571
McAfeeGenericRXAA-AA!7E627A2036D1
CylanceUnsafe
SangforMalware
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderTrojan.GenericKDZ.72253
K7GWRiskware ( 0040eff71 )
Cybereasonmalicious.e5964e
CyrenW32/Kryptik.CVF.gen!Eldorado
SymantecML.Attribute.HighConfidence
TrendMicro-HouseCallTROJ_GEN.R002H0CLS20
AvastWin32:DropperX-gen [Drp]
CynetMalicious (score: 100)
KasperskyTrojan-Spy.Win32.Stealer.vqk
AlibabaTrojanSpy:Win32/Stealer.73ae41cf
MicroWorld-eScanTrojan.GenericKDZ.72253
TencentWin32.Trojan-spy.Stealer.Akfi
Ad-AwareTrojan.GenericKDZ.72253
EmsisoftTrojan.GenericKDZ.72253 (B)
ComodoMalware@#1uxzacbz23uyx
F-SecureTrojan.TR/Crypt.Agent.erkxq
McAfee-GW-EditionBehavesLike.Win32.Trojan.hc
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_59%
AviraTR/Crypt.Agent.erkxq
KingsoftWin32.Troj.Undef.(kcloud)
GridinsoftTrojan.Win32.Kryptik.oa
ArcabitTrojan.Generic.D11A3D
ZoneAlarmTrojan-Spy.Win32.Stealer.vqk
GDataTrojan.GenericKDZ.72253
AhnLab-V3Malware/Win32.Generic.C4282525
Acronissuspicious
MAXmalware (ai score=88)
MalwarebytesTrojan.MalPack.GS
PandaTrj/Genetic.gen
APEXMalicious
ESET-NOD32a variant of Win32/Kryptik.HILM
RisingBackdoor.Agent!8.C5D (TFE:5:IhzqwXEXQUL)
IkarusTrojan.Win32.Crypt
FortinetW32/Kryptik.HGHW!tr
WebrootW32.Trojan.Gen
AVGWin32:DropperX-gen [Drp]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360Win32/Trojan.Spy.b30

How to remove Trojan-Spy.Win32.Stealer.vqk?

Trojan-Spy.Win32.Stealer.vqk removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment