Trojan

Trojan.Waski.S28288290 removal guide

Malware Removal

The Trojan.Waski.S28288290 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Waski.S28288290 virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Authenticode signature is invalid

How to determine Trojan.Waski.S28288290?


File Info:

name: C34EF7019A9FD3800C5C.mlw
path: /opt/CAPEv2/storage/binaries/7063aee27bd7ce40c8e83ffa783fb2286cd9d4b6108691902d7919cf6b8e5ef3
crc32: F327580F
md5: c34ef7019a9fd3800c5cb024093985f8
sha1: 0df8df27a4595f3f70db5f54c85a855252107c37
sha256: 7063aee27bd7ce40c8e83ffa783fb2286cd9d4b6108691902d7919cf6b8e5ef3
sha512: 3615bc7616a3aaee7047545897fbe33e639c32e8949db15cb7eca5996709e0825105a025069939de29c135b05abb90402b0c4c364866e983f0215e03e2f6549e
ssdeep: 96:9uKB7r0gHNw0iNw1lvKXbUp8wAnQWRRU1xXHZTHG3A5WQkdx5CnkFyAn/Gu:kKhDt6NkKQWRREHZSmWxJT/R
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T123D195698FD415B2E3BB8A7186F78586FF3470233B014C9E65BB83450913A929D6278E
sha3_384: 147b4196035a576e09064b4e8a04a6bbbef039ea1c09eea59397397a3edbbdea9e5e8cac6646f3179ba7b49a0c30355c
ep_bytes: 81ec3008000053555633db578beb5389
timestamp: 2014-05-15 13:24:22

Version Info:

0: [No Data]

Trojan.Waski.S28288290 also known as:

LionicTrojan.Win32.Upatre.1j!c
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Ppatre.Gen.1
FireEyeGeneric.mg.c34ef7019a9fd380
CAT-QuickHealTrojan.Waski.S28288290
SkyhighBehavesLike.Win32.Generic.xt
ALYacTrojan.Ppatre.Gen.1
Cylanceunsafe
VIPRETrojan.Ppatre.Gen.1
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan-Downloader ( 005a3aca1 )
BitDefenderTrojan.Ppatre.Gen.1
K7GWTrojan-Downloader ( 005a3aca1 )
Cybereasonmalicious.7a4595
VirITTrojan.Win32.Upatre.BX
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32Win32/TrojanDownloader.Waski.E
APEXMalicious
ClamAVWin.Packed.Upatre-9982428-0
KasperskyHEUR:Trojan-Downloader.Win32.Upatre.gen
AlibabaMalware:Win32/km_2c98.None
NANO-AntivirusTrojan.Win32.Waski.jueqyd
RisingDownloader.Waski!8.184 (TFE:2:DeqlpRkc9eH)
EmsisoftTrojan.Ppatre.Gen.1 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen2
DrWebTrojan.DownLoader.origin
ZillyaDownloader.Waski.Win32.59499
TrendMicroTROJ_UPATRE.SM37
Trapminemalicious.moderate.ml.score
SophosMal/EncPk-ACO
SentinelOneStatic AI – Malicious PE
MAXmalware (ai score=81)
JiangminTrojanDownloader.Upatre.aofg
GoogleDetected
AviraTR/Crypt.XPACK.Gen2
VaristW32/Upatre.PK.gen!Eldorado
Antiy-AVLTrojan/Win32.Waski.a
Kingsoftmalware.kb.a.999
MicrosoftTrojanDownloader:Win32/Waski.AW!MTB
ArcabitTrojan.Ppatre.Gen.1
ZoneAlarmHEUR:Trojan-Downloader.Win32.Upatre.gen
GDataTrojan.Ppatre.Gen.1
CynetMalicious (score: 100)
Acronissuspicious
VBA32SScope.Trojan-Downloader.1454
DeepInstinctMALICIOUS
MalwarebytesWaski.Trojan.Downloader.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_UPATRE.SM37
TencentTrojan-Downloader.Win32.Upatre.ht
YandexTrojan.GenAsa!zfalv5UzsQI
IkarusTrojan-Downloader.Win32.Waski
MaxSecureTrojan.Upatre.Gen
FortinetW32/EncPk.ACO!tr
BitDefenderThetaGen:NN.ZexaF.36792.auX@aeIRmDbi
AVGWin32:TrojanX-gen [Trj]
AvastWin32:TrojanX-gen [Trj]
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Waski.S28288290?

Trojan.Waski.S28288290 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment