Trojan

How to remove “Trojan.Waski.S28288290”?

Malware Removal

The Trojan.Waski.S28288290 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Waski.S28288290 virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Authenticode signature is invalid

How to determine Trojan.Waski.S28288290?


File Info:

name: 218D37BF4B9C947DFE14.mlw
path: /opt/CAPEv2/storage/binaries/2a0f24e961ffa2f749fdadb628b00b78d3e2dc5d34e0d2314a210b4ef9243112
crc32: E0B15E6E
md5: 218d37bf4b9c947dfe140f53d8827a3e
sha1: 8dcd96a31930a6f77ab8cda39145cc7b10a3f7e6
sha256: 2a0f24e961ffa2f749fdadb628b00b78d3e2dc5d34e0d2314a210b4ef9243112
sha512: 0fd82df1527d2cc09603babe1445e6e207eae7686aea3af6608137183687e5374d45ca176e5bef5c1a2680300f147634659151f701f41f606a44a347f2b8696c
ssdeep: 192:kKhDt6N6YTKQWRREHZ0RedJzJzVqCyGK4IpE6gimrB1rLt0:kK1MluQWRREHZlgbPpiimrPLS
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1E352253C9ED95572E3BBCA76C5F645CAFA60B42339029C1E50DB43850823F57ADA1A0E
sha3_384: 6a33a4bc8e2984458ce6de379c9ee0a5a8bad2d1c8275e6d303bb4c9d2142b6fe45cecf023d165051fa0eebdd52b761e
ep_bytes: 81ec3008000053555633db578beb5389
timestamp: 2014-05-15 13:24:22

Version Info:

0: [No Data]

Trojan.Waski.S28288290 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Upatre.1j!c
tehtrisGeneric.Malware
DrWebTrojan.DownLoader.origin
MicroWorld-eScanTrojan.Ppatre.Gen.1
ClamAVWin.Packed.Upatre-9982428-0
CAT-QuickHealTrojan.Waski.S28288290
SkyhighBehavesLike.Win32.Generic.lz
McAfeeArtemis!218D37BF4B9C
MalwarebytesWaski.Trojan.Downloader.DDS
ZillyaDownloader.Waski.Win32.59499
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan-Downloader ( 005a3aca1 )
AlibabaMalware:Win32/km_2c98.None
K7GWTrojan-Downloader ( 005a3aca1 )
Cybereasonmalicious.31930a
BitDefenderThetaGen:NN.ZexaF.36680.auX@aeIRmDbi
VirITTrojan.Win32.Upatre.BX
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32Win32/TrojanDownloader.Waski.E
APEXMalicious
CynetMalicious (score: 100)
KasperskyUDS:Trojan.Win32.Generic
BitDefenderTrojan.Ppatre.Gen.1
NANO-AntivirusTrojan.Win32.Waski.jueqyd
AvastWin32:TrojanX-gen [Trj]
TencentTrojan-Downloader.Win32.Upatre.ht
EmsisoftTrojan.Ppatre.Gen.1 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen2
VIPRETrojan.Ppatre.Gen.1
TrendMicroTROJ_UPATRE.SM37
SophosMal/EncPk-ACO
SentinelOneStatic AI – Malicious PE
JiangminTrojanDownloader.Upatre.aofg
GoogleDetected
AviraTR/Crypt.XPACK.Gen2
MAXmalware (ai score=80)
Antiy-AVLTrojan[Downloader]/Win32.Waski
KingsoftWin32.Trojan.Generic.a
MicrosoftTrojanDownloader:Win32/Waski.AW!MTB
ArcabitTrojan.Ppatre.Gen.1
ZoneAlarmUDS:Trojan.Win32.Generic
GDataWin32.Trojan-Downloader.Upatre.BJ
VaristW32/Upatre.PK.gen!Eldorado
AhnLab-V3Trojan/Win.DownLoader.R567662
Acronissuspicious
VBA32SScope.Trojan-Downloader.1454
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_UPATRE.SM37
RisingDownloader.Waski!8.184 (TFE:2:DeqlpRkc9eH)
YandexTrojan.GenAsa!zfalv5UzsQI
IkarusTrojan-Downloader.Win32.Waski
MaxSecureTrojan.Upatre.Gen
FortinetW32/EncPk.ACO!tr
AVGWin32:TrojanX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Waski.S28288290?

Trojan.Waski.S28288290 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment