Trojan

Trojan.Win32.APosT.aabv (file analysis)

Malware Removal

The Trojan.Win32.APosT.aabv is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.APosT.aabv virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • Creates an autorun.inf file
  • Authenticode signature is invalid
  • Checks for the presence of known windows from debuggers and forensic tools
  • Checks for the presence of known devices from debuggers and forensic tools
  • Checks for the presence of known devices from debuggers and forensic tools
  • Detects the presence of Wine emulator via registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Creates a copy of itself
  • Creates known Njrat/Bladabindi RAT registry keys
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan.Win32.APosT.aabv?


File Info:

name: 0D1A660ABC5C3ACE7A05.mlw
path: /opt/CAPEv2/storage/binaries/8716c80f040bb75de61ccba01de8b6220037acb9a5c32dbf569e1fe6ebe4644a
crc32: AEC538FB
md5: 0d1a660abc5c3ace7a05cbacf7b56fe5
sha1: 6373996a9c3aeb9a130c281e5a2f85e6159ea9ea
sha256: 8716c80f040bb75de61ccba01de8b6220037acb9a5c32dbf569e1fe6ebe4644a
sha512: c7b16bbd27a346b1fd76f39d4021399c686fe8a5ef6c6c1570306268fd301b6251fe812e6e1054ca215b09aa0fbb0117c1ef6435617babb170d3e41cb4519241
ssdeep: 196608:mnmdfan/8d5pMAD6fan/8d5pMADFfan/8d5pMADX:mnV83ph383ph883phX
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1D4A6CF5FAF51C8E2C0130638FD1F9FB80615BD536E6CA6536AA97D4E2EF3340A51224E
sha3_384: 81d071c48c44c6d3af7ce4982f320de1f8fc3f1791c4938ea9a84c76b9946dd22c847d512df23da45ee85622981158e3
ep_bytes: 558becb90d0000006a006a004975f951
timestamp: 1992-06-19 22:22:17

Version Info:

CompanyName: TAMS Diag Inc.
FileDescription: Remotely Programming
FileVersion: 5.0.0.89
InternalName:
LegalCopyright: Copyright (C) Longtion Software Inc. 2005-2023. All rights reserved.
LegalTrademarks:
OriginalFilename:
ProductName:
ProductVersion: 5.0.0.0
Translation: 0x0409 0x04e4

Trojan.Win32.APosT.aabv also known as:

Elasticmalicious (moderate confidence)
MicroWorld-eScanGen:Trojan.Heur.SFB.@J3aaqvDIVljb
VIPREGen:Trojan.Heur.SFB.@J3aaqvDIVljb
SangforTrojan.Win32.Save.ShadowBrokersC
BitDefenderGen:Trojan.Heur.SFB.@J3aaqvDIVljb
BitDefenderThetaAI:Packer.A6665D7D21
APEXMalicious
ClamAVWin.Dropper.Tinba-9943147-2
KasperskyTrojan.Win32.APosT.aabv
AvastWin32:Malware-gen
RisingTrojan.Generic@AI.97 (RDML:0AWZABlCMN11ku6+GToX6w)
EmsisoftGen:Trojan.Heur.SFB.@J3aaqvDIVljb (B)
FireEyeGen:Trojan.Heur.SFB.@J3aaqvDIVljb
ArcabitTrojan.Heur.SFB.ED87F7
ZoneAlarmTrojan.Win32.APosT.aabv
GDataGen:Trojan.Heur.SFB.@J3aaqvDIVljb
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.C5399493
VBA32TScope.Malware-Cryptor.SB
ALYacGen:Trojan.Heur.SFB.@J3aaqvDIVljb
MAXmalware (ai score=83)
TencentMalware.Win32.Gencirc.13abf9f8
AVGWin32:Malware-gen

How to remove Trojan.Win32.APosT.aabv?

Trojan.Win32.APosT.aabv removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment