Spy Trojan

What is “Trojan-Spy.Win32.Stealer.vqo”?

Malware Removal

The Trojan-Spy.Win32.Stealer.vqo is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.vqo virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (3 unique times)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Ukrainian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Attempts to identify installed AV products by installation directory
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Anomalous binary characteristics

Related domains:

iplogger.org
leatherbond.top

How to determine Trojan-Spy.Win32.Stealer.vqo?


File Info:

crc32: 35C9587B
md5: 0ee74f44700ad685b4487aaa4e20874e
name: 0EE74F44700AD685B4487AAA4E20874E.mlw
sha1: 923303b9769e44f6deb3a857b023d94fd81b05e7
sha256: 17812ccf744622c22a465fd1d2c0098dbf215423dd433014afab29e232446e4c
sha512: e292764c37a4f5b88c9013c7cd5ec96ef783329ce4fbf4de0df66875168dfdebfd2e2046a1d182eb6f1670ae74f89e910351c0706accb62b289da60eb91e8f57
ssdeep: 12288:yvVdnUhH3er0DDg7B+CX2KBMhlfpx2mKbO9lFFQvYsWSvWAgtrw:iVdnA3C0/g7N2tBJ/FFQlLOAgm
type: PE32 executable (GUI) Intel 80386 system file, for MS Windows, UPX compressed

Version Info:

InternalSurname: debaukd.ekze
Product: 1.7.8
FileVersions: 1.0.5.6
LegalCo: Copyri (C) 2019, permudationz

Trojan-Spy.Win32.Stealer.vqo also known as:

Elasticmalicious (high confidence)
DrWebTrojan.Siggen11.56760
MicroWorld-eScanTrojan.GenericKDZ.72276
FireEyeGeneric.mg.0ee74f44700ad685
McAfeeRDN/RedLineStealer
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 005755731 )
BitDefenderTrojan.GenericKDZ.72276
K7GWTrojan ( 005755731 )
Cybereasonmalicious.9769e4
CyrenW32/Kryptik.CVF.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:MalwareX-gen [Trj]
KasperskyTrojan-Spy.Win32.Stealer.vqo
AlibabaTrojan:Win32/GenKryptik.927a62eb
ViRobotTrojan.Win32.Z.Bulz.608256.A
AegisLabTrojan.Multi.Generic.4!c
Ad-AwareTrojan.GenericKDZ.72276
SophosMal/Generic-S
F-SecureTrojan.TR/Crypt.Agent.vxbjj
McAfee-GW-EditionBehavesLike.Win32.PWSBanker.hc
EmsisoftTrojan.GenericKDZ.72276 (B)
SentinelOneStatic AI – Malicious PE
AviraTR/Crypt.Agent.vxbjj
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Zenpack.MT!MTB
GridinsoftTrojan.Win32.Kryptik.oa
ArcabitTrojan.Generic.D11A54
ZoneAlarmTrojan-Spy.Win32.Stealer.vqo
GDataTrojan.GenericKDZ.72276
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.Generic.C4282675
Acronissuspicious
MAXmalware (ai score=88)
MalwarebytesTrojan.MalPack.GS
PandaTrj/GdSda.A
ESET-NOD32a variant of Win32/Kryptik.HILM
TrendMicro-HouseCallTROJ_GEN.R002H0CLS20
RisingBackdoor.Agent!8.C5D (TFE:5:IhzqwXEXQUL)
IkarusTrojan.Win32.Crypt
eGambitUnsafe.AI_Score_93%
FortinetW32/Kryptik.HGHW!tr
WebrootW32.Trojan.Glupteba
AVGWin32:MalwareX-gen [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (W)
Qihoo-360Generic/HEUR/QVM11.1.3A10.Malware.Gen

How to remove Trojan-Spy.Win32.Stealer.vqo?

Trojan-Spy.Win32.Stealer.vqo removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment