Spy Trojan

Trojan-Spy.Win32.Stealer.vqr removal guide

Malware Removal

The Trojan-Spy.Win32.Stealer.vqr is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Stealer.vqr virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (3 unique times)
  • Creates RWX memory
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Ukrainian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Checks for the presence of known windows from debuggers and forensic tools
  • Installs itself for autorun at Windows startup
  • Attempts to identify installed AV products by installation directory
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Anomalous binary characteristics

Related domains:

iplogger.org
leatherbond.top
ip-api.com

How to determine Trojan-Spy.Win32.Stealer.vqr?


File Info:

crc32: 9A234691
md5: 8b79f51c58cf0a09b26188c81b946b0c
name: 8B79F51C58CF0A09B26188C81B946B0C.mlw
sha1: d08ca00c31703fada0a711777e04b2e47851f986
sha256: 8efceb79e6d9de8a6c654b3ab191ad66a02cb1685c76f59dea3e81ef39deb4e9
sha512: f950d828b8490980f9634679225e6fc56a38e5198a08db973cd62a7dd8d9abe9cca4e3c8454d54c8f43b4f769708129cd866c429ba963a78f00a88b5823f689b
ssdeep: 12288:Xly1GNIDs7mGKD0WismHa6XtK4J7DVf+P3LtZXP:uGzmGVimHbpJ7DN+z
type: PE32 executable (GUI) Intel 80386 system file, for MS Windows, UPX compressed

Version Info:

InternalSurname: debaukd.ekze
Product: 1.7.8
FileVersions: 1.0.5.6
LegalCo: Copyri (C) 2019, permudationz

Trojan-Spy.Win32.Stealer.vqr also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKDZ.72276
FireEyeGeneric.mg.8b79f51c58cf0a09
Qihoo-360Generic/HEUR/QVM11.1.3957.Malware.Gen
McAfeeGenericRXAA-AA!8B79F51C58CF
CylanceUnsafe
SangforMalware
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderTrojan.GenericKDZ.72276
K7GWRiskware ( 0040eff71 )
CrowdStrikewin/malicious_confidence_100% (D)
CyrenW32/Kryptik.CVF.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan-Spy.Win32.Stealer.vqr
AlibabaTrojanSpy:Win32/Stealer.316e6585
AegisLabTrojan.Win32.Malicious.4!c
Ad-AwareTrojan.GenericKDZ.72276
EmsisoftTrojan.GenericKDZ.72276 (B)
DrWebTrojan.Siggen11.56760
McAfee-GW-EditionBehavesLike.Win32.PWSBanker.hc
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
MAXmalware (ai score=83)
Antiy-AVLTrojan/Win32.Kryptik
MicrosoftTrojan:Win32/Glupteba!ml
GridinsoftMalware.Win32.Gen.oa
ArcabitTrojan.Generic.D11A54
ZoneAlarmTrojan-Spy.Win32.Stealer.vqr
GDataTrojan.GenericKDZ.72276
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.Generic.C4282675
Acronissuspicious
ALYacTrojan.GenericKDZ.72276
VBA32Trojan.Glupteba
MalwarebytesTrojan.MalPack.GS
PandaTrj/CI.A
ESET-NOD32a variant of Win32/Kryptik.HILM
TrendMicro-HouseCallTROJ_GEN.R002H09LS20
RisingBackdoor.Agent!8.C5D (TFE:5:IhzqwXEXQUL)
IkarusTrojan.Win32.Krypt
FortinetW32/Kryptik.HGHW!tr
AVGWin32:MalwareX-gen [Trj]
AvastWin32:MalwareX-gen [Trj]

How to remove Trojan-Spy.Win32.Stealer.vqr?

Trojan-Spy.Win32.Stealer.vqr removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment