Trojan

How to remove “Trojan.Waski.S28288290”?

Malware Removal

The Trojan.Waski.S28288290 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Waski.S28288290 virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Authenticode signature is invalid

How to determine Trojan.Waski.S28288290?


File Info:

name: A625665E83F7C356B4E8.mlw
path: /opt/CAPEv2/storage/binaries/8fd6e5e89e4f01ee0186de1abc7b9e36b4b4e1125b034a16fb81c4011650daa2
crc32: 8E6D47A5
md5: a625665e83f7c356b4e88b538e84848a
sha1: 502c8ea8566160036b54ba25fab81565b46848f7
sha256: 8fd6e5e89e4f01ee0186de1abc7b9e36b4b4e1125b034a16fb81c4011650daa2
sha512: e6ab666abdd32ecdbcfe3b7912a38c96cb5cf012dc5ed8a22d9f1193b3d5969eee185ae086484c29803fc4c3577c2a5df0b17fa157b2225834e244615add3e7f
ssdeep: 192:kKhDt6N6YTKQWRREHZ0RedJzJ8yx5OmVb/j:kK1MluQWRREHZlwMP
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16512AD7D9FD55572F3BB8A76C5F241CBFA30B0233A025D5E50AB03850D23B92ADA164E
sha3_384: 5e67b29f244ed85c8f8da7a8211fd18cb45deff8b4b8f44321a8c880403cd2bace5339572886d90b3949aefd1b357ca3
ep_bytes: 81ec3008000053555633db578beb5389
timestamp: 2014-05-15 13:24:22

Version Info:

0: [No Data]

Trojan.Waski.S28288290 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Convagent.4!c
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.Ppatre.Gen.1
FireEyeGeneric.mg.a625665e83f7c356
CAT-QuickHealTrojan.Waski.S28288290
SkyhighBehavesLike.Win32.Generic.xt
ALYacTrojan.Ppatre.Gen.1
Cylanceunsafe
VIPRETrojan.Ppatre.Gen.1
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan-Downloader ( 005a3aca1 )
BitDefenderTrojan.Ppatre.Gen.1
K7GWTrojan-Downloader ( 005a3aca1 )
CrowdStrikewin/malicious_confidence_100% (W)
VirITTrojan.Win32.Upatre.BX
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32Win32/TrojanDownloader.Waski.E
APEXMalicious
ClamAVWin.Packed.Upatre-9982428-0
KasperskyUDS:Trojan.Win32.Generic
AlibabaMalware:Win32/km_2c98.None
NANO-AntivirusTrojan.Win32.Waski.jueqyd
RisingDownloader.Waski!8.184 (TFE:2:DeqlpRkc9eH)
EmsisoftTrojan.Ppatre.Gen.1 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen2
DrWebTrojan.DownLoader.origin
ZillyaDownloader.Waski.Win32.59499
TrendMicroTROJ_UPATRE.SM37
Trapminemalicious.moderate.ml.score
SophosMal/EncPk-ACO
SentinelOneStatic AI – Malicious PE
MAXmalware (ai score=82)
JiangminTrojanDownloader.Upatre.aofg
GoogleDetected
AviraTR/Crypt.XPACK.Gen2
VaristW32/Upatre.PK.gen!Eldorado
Antiy-AVLTrojan/Win32.Waski.a
Kingsoftmalware.kb.a.999
MicrosoftTrojanDownloader:Win32/Waski.AW!MTB
ArcabitTrojan.Ppatre.Gen.1
ViRobotTrojan.Win.Z.Waski.9056.AW
ZoneAlarmUDS:Trojan.Win32.Generic
GDataTrojan.Ppatre.Gen.1
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.DownLoader.R567662
Acronissuspicious
McAfeeArtemis!A625665E83F7
DeepInstinctMALICIOUS
VBA32SScope.Trojan-Downloader.1454
MalwarebytesWaski.Trojan.Downloader.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_UPATRE.SM37
TencentTrojan-Downloader.Win32.Upatre.ht
IkarusTrojan-Downloader.Win32.Waski
MaxSecureTrojan.Upatre.Gen
FortinetW32/EncPk.ACO!tr
BitDefenderThetaGen:NN.ZexaF.36792.auX@aeIRmDbi
AVGWin32:TrojanX-gen [Trj]
Cybereasonmalicious.856616
AvastWin32:TrojanX-gen [Trj]

How to remove Trojan.Waski.S28288290?

Trojan.Waski.S28288290 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment