Trojan

About “Trojan.Waski.S28288290” infection

Malware Removal

The Trojan.Waski.S28288290 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Waski.S28288290 virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Authenticode signature is invalid

How to determine Trojan.Waski.S28288290?


File Info:

name: FF711E5AAB981127B275.mlw
path: /opt/CAPEv2/storage/binaries/4e1e50c59a95e30e15db8a660710517168db76333ed75de86bb7623ea918bf66
crc32: A54B008B
md5: ff711e5aab981127b2754ed8b7e91833
sha1: a05504118dd7cf71b38c2263769aa2a96c32a95c
sha256: 4e1e50c59a95e30e15db8a660710517168db76333ed75de86bb7623ea918bf66
sha512: c0ce7def629c00ef0f177585a3eead13acc0b14771532c562fc88c9f8c625622686365baf128cac838b961cb452b745cc9c0c8c2cdc9b4c43591c378d93cb743
ssdeep: 96:9uKB7r0gHNw0iNwrYTKXbUp8wAnQWRRU1xXHZzBXUZBqjBtWe1:kKhDt6N6YTKQWRREHZdwI9
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T12CC1956A8BD415B1F3BB4E3146F78185BF7070233B0189EE65BB538509535D19D32B8B
sha3_384: 2b3d8159fb5fa7ea1d8124e3de2380fb6db3434d30687a96654f67149984856c89a7cebd07814450d1334526c9cb744a
ep_bytes: 81ec3008000053555633db578beb5389
timestamp: 2014-05-15 13:24:22

Version Info:

0: [No Data]

Trojan.Waski.S28288290 also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.Ppatre.Gen.1
ClamAVWin.Packed.Upatre-9982428-0
FireEyeGeneric.mg.ff711e5aab981127
CAT-QuickHealTrojan.Waski.S28288290
Cylanceunsafe
VIPRETrojan.Ppatre.Gen.1
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan-Downloader ( 005a3aca1 )
K7GWTrojan-Downloader ( 005a3aca1 )
CrowdStrikewin/malicious_confidence_100% (D)
VirITTrojan.Win32.Upatre.BX
CyrenW32/Upatre.PK.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32Win32/TrojanDownloader.Waski.E
APEXMalicious
CynetMalicious (score: 100)
KasperskyVHO:Trojan.Win32.Convagent.gen
BitDefenderTrojan.Ppatre.Gen.1
NANO-AntivirusTrojan.Win32.Waski.jueqyd
AvastWin32:TrojanX-gen [Trj]
TencentTrojan-Downloader.Win32.Upatre.ht
EmsisoftTrojan.Ppatre.Gen.1 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen2
DrWebTrojan.DownLoader.origin
ZillyaDownloader.Waski.Win32.59499
TrendMicroTROJ_UPATRE.SM37
McAfee-GW-EditionBehavesLike.Win32.Generic.zt
Trapminemalicious.moderate.ml.score
SophosMal/EncPk-ACO
IkarusTrojan-Downloader.Win32.Waski
GDataTrojan.Ppatre.Gen.1
JiangminTrojanDownloader.Upatre.aofg
AviraTR/Crypt.XPACK.Gen2
Antiy-AVLTrojan/Win32.Waski.a
Kingsoftmalware.kb.a.998
ArcabitTrojan.Ppatre.Gen.1
ZoneAlarmVHO:Trojan.Win32.Convagent.gen
MicrosoftTrojanDownloader:Win32/Waski.AW!MTB
GoogleDetected
AhnLab-V3Trojan/Win.DownLoader.R567662
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36738.auX@aeIRmDbi
ALYacTrojan.Ppatre.Gen.1
MAXmalware (ai score=89)
VBA32SScope.Trojan-Downloader.1454
MalwarebytesWaski.Trojan.Downloader.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_UPATRE.SM37
RisingDownloader.Waski!8.184 (TFE:2:DeqlpRkc9eH)
YandexTrojan.GenAsa!zfalv5UzsQI
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Upatre.Gen
FortinetW32/EncPk.ACO!tr
AVGWin32:TrojanX-gen [Trj]
Cybereasonmalicious.18dd7c
DeepInstinctMALICIOUS

How to remove Trojan.Waski.S28288290?

Trojan.Waski.S28288290 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment