Trojan

Trojan.Vittalia (file analysis)

Malware Removal

The Trojan.Vittalia is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Vittalia virus can do?

  • Attempts to connect to a dead IP:Port (3 unique times)
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Exhibits possible ransomware file modification behavior
  • Checks the version of Bios, possibly for anti-virtualization
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to create or modify system certificates
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
flow.lavasoft.com
redirector.gvt1.com
r3—sn-4g5e6nzz.gvt1.com
update.googleapis.com

How to determine Trojan.Vittalia?


File Info:

crc32: 27BD15E1
md5: 8f1d0bc215200dea12f15e321263257c
name: 8F1D0BC215200DEA12F15E321263257C.mlw
sha1: 021068a7a5e28e85c5709ed25740f0d42d91f7e9
sha256: ce897f6f1d7c3549e6c9dd020d4489fe52da7a9e20b45422a7b1efd2c5dcc058
sha512: e3a2f6232a99902f21b97a58e337b9595055149e4a439880f2cc08cf4b843d9e8002b550959f75f804a7da8d0b529008d5185c32b3b21f8aee3736c7cec460b1
ssdeep: 49152:aG5UfgPrxenl7SsR3wg6PEcmXTQ05G3J2f8cNL/u+lUmPZJSLEfoDV8Luzj:aG5QgFend48jdG3UflL2+ltb1Lu3
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9 Adaware 2020
InternalName:
FileVersion: 1.3.0.3632
CompanyName: IC001_Web
ProductName: IC001_Web's Installer
ProductVersion: 1.3.0.3632
FileDescription: Software Installation
OriginalFilename:
Translation: 0x0409 0x04b0

Trojan.Vittalia also known as:

Elasticmalicious (high confidence)
DrWebTrojan.Vittalia.18899
MicroWorld-eScanTrojan.GenericKD.45389403
FireEyeTrojan.GenericKD.45389403
ALYacTrojan.GenericKD.45389403
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
BitDefenderTrojan.GenericKD.45389403
K7GWAdware ( 005359081 )
K7AntiVirusAdware ( 005359081 )
CyrenW32/WebCompanion.C.gen!Eldorado
AvastWin32:UnwantedSig [PUP]
NANO-AntivirusRiskware.Win32.WebCompanion.ifcdtp
RisingPUF.WebCompanion!8.9E98 (TFE:5:hZVAGw24YfV)
Ad-AwareTrojan.GenericKD.45389403
EmsisoftApplication.Downloader (A)
ComodoMalware@#152bq38byqhcv
F-SecureHeuristic.HEUR/AGEN.1140154
TrendMicroTROJ_GEN.R002C0PLV20
McAfee-GW-EditionBehavesLike.Win32.Generic.vc
SophosGeneric PUA AC (PUA)
AviraHEUR/AGEN.1140154
Antiy-AVLGrayWare/Win32.Vittalia.a
MicrosoftPUA:Win32/ICBundler
ArcabitTrojan.Generic.D2B4965B
GDataTrojan.GenericKD.45389403
CynetMalicious (score: 100)
McAfeeGenericRXMT-JS!8F1D0BC21520
MAXmalware (ai score=81)
VBA32Trojan.Vittalia
MalwarebytesPUP.Optional.BundleInstaller
ESET-NOD32a variant of Win32/WebCompanion.B potentially unwanted
TrendMicro-HouseCallTROJ_GEN.R002C0PLV20
YandexRiskware.Agent!n/D5x7TAnCw
FortinetRiskware/Generic_PUA_AC
AVGWin32:UnwantedSig [PUP]

How to remove Trojan.Vittalia?

Trojan.Vittalia removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment