Trojan

Trojan.TLDR removal instruction

Malware Removal

The Trojan.TLDR is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.TLDR virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Drops a binary and executes it
  • Detects SunBelt Sandbox through the presence of a library
  • Detects Avast Antivirus through the presence of a library
  • Detects Sandboxie through the presence of a library
  • Attempts to remove evidence of file being downloaded from the Internet
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Attempts to modify proxy settings
  • Operates on local firewall’s policies and settings
  • Creates a copy of itself
  • Attempts to modify or disable Security Center warnings
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
tldrbox.top
aeufoeahfouefhgp.ru
aefuaeufhueuufup.ru
awduhawduhuhhagp.ru

How to determine Trojan.TLDR?


File Info:

crc32: 6E29D784
md5: 7c2175b6e89729748f8c24f41f6283ae
name: 2.exe
sha1: 7042a5d0e49e6d4af43bfadf9800e45ad25b7016
sha256: f8a3b64aa3c1c639a5ce1b100de860d4f97703879df0d01ce0118ae97c1b7423
sha512: 6bab43ba10879309f13fa26a911f19ea5ef53d7819ce05d4b8b776ed5cb448c0688c9c0eeb994e9a795838468b565dec67e97bb9d239c068eaaac4031441090e
ssdeep: 6144:0Yntn+wuymA4nRe7W62vvngTZ3kvaGAwypEafBdRoiuy/e/sZ23EqCzAU/Gag:FtM9e7W63VEiNhLysZ66kU/Gj
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: www.BitComet.com (c) 2015 Company
InternalName: Sarcastic
FileVersion: 3.2.75.324
CompanyName: www.BitComet.com
PrivateBuild: 3.2.75.324
LegalTrademarks: www.BitComet.com (c) 2015 Company
Comments: Unchanged Reasn Impersonate
ProductName: Sarcastic
Languages: English
ProductVersion: 3.2.75.324
FileDescription: Unchanged Reasn Impersonate
OriginalFilename: Sarcastic
Translation: 0x0409 0x04b0

Trojan.TLDR also known as:

MicroWorld-eScanTrojan.GenericKD.42949404
Qihoo-360Generic/Trojan.03c
McAfeeRDN/Generic.cf
MalwarebytesTrojan.TLDR
AegisLabTrojan.Win32.Malicious.4!c
BitDefenderTrojan.GenericKD.42949404
Cybereasonmalicious.0e49e6
ArcabitTrojan.Generic.D28F5B1C
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Phorpiex.V
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan-Dropper.Win32.Dropback.rf
RisingWorm.Phorpiex!8.48D (CLOUD)
Ad-AwareTrojan.GenericKD.42949404
EmsisoftTrojan.GenericKD.42949404 (B)
F-SecureTrojan.TR/AD.Phorpiex.abjl
Invinceaheuristic
McAfee-GW-EditionArtemis!Trojan
FireEyeGeneric.mg.7c2175b6e8972974
SophosMal/Generic-S
IkarusWin32.Outbreak
AviraTR/AD.Phorpiex.abjl
FortinetW32/Phorpiex.V!worm
Endgamemalicious (high confidence)
MicrosoftTrojan:Win32/Skeeyah.B!rfn
ZoneAlarmTrojan-Dropper.Win32.Dropback.rf
TACHYONTrojan-Dropper/W32.Dropback.556032
AhnLab-V3Malware/Win32.Generic.C4052493
Acronissuspicious
VBA32BScope.TrojanRansom.Blocker
MAXmalware (ai score=87)
TencentWin32.Worm.Phorpiex.Ahyf
SentinelOneDFI – Malicious PE
eGambitUnsafe.AI_Score_99%
GDataTrojan.GenericKD.42949404
BitDefenderThetaGen:NN.ZexaF.34106.Hy0@aGQNtgii
AVGFileRepMalware
AvastFileRepMalware
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Trojan.TLDR?

Trojan.TLDR removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment