Trojan

Trojan.Win32.Convagent.aao (file analysis)

Malware Removal

The Trojan.Win32.Convagent.aao is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Convagent.aao virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Deletes executed files from disk
  • Attempts to modify Windows Defender using PowerShell
  • Collects information to fingerprint the system

How to determine Trojan.Win32.Convagent.aao?


File Info:

name: B7EBC59DF1A18AE009E2.mlw
path: /opt/CAPEv2/storage/binaries/afef4c35942e4ec3827008a6e62a4a9ce9c6cd5399afdcf7eb5538150b0820e9
crc32: 70AF764C
md5: b7ebc59df1a18ae009e2544ca5febd77
sha1: 145504ed53eeccf17ef2330a4cbe821cef7b1bca
sha256: afef4c35942e4ec3827008a6e62a4a9ce9c6cd5399afdcf7eb5538150b0820e9
sha512: 681d926515c36b5e6294f2b8cac57437fa7d108d642a87779f458c2711e27872458719b1e97322792d0010469943bf92dba8d0e17a452e01b38520c2e5adb40a
ssdeep: 98304:XkLZ8Hw2ek3xwp7uRMmdAtzNMYCpADdQRuPy:sZ8Hw2VB07uRDdqNaRRuPy
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1DEE5E03BF268653EC56A0A3146F39210DD7BAE61681A8C1A17FC370DCF364601FFA656
sha3_384: 580e9bc038e6c108bf003b44a924db9cf5a1b7cf3edf00bd3656118d04e8f783123ded90609dddc4f7042bf078c3e630
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2022-04-14 16:10:23

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: - Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: -
ProductVersion: 2.0
Translation: 0x0000 0x04b0

Trojan.Win32.Convagent.aao also known as:

LionicTrojan.Win32.Convagent.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Cerbu.154900
FireEyeGen:Variant.Cerbu.154900
McAfeeArtemis!B7EBC59DF1A1
CylanceUnsafe
VIPREGen:Variant.Cerbu.154900
SangforTrojan.Win32.Convagent.V7m1
K7AntiVirusRiskware ( 00584baa1 )
AlibabaTrojan:Win32/Convagent.6e131c3f
K7GWRiskware ( 00584baa1 )
Cybereasonmalicious.d53eec
CyrenW32/BlueWushu.A.gen!Eldorado
SymantecTrojan.Gen.MBT
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Convagent.aao
BitDefenderGen:Variant.Cerbu.154900
AvastWin32:Malware-gen
TencentTrojan.Win32.Convagent.hf
Ad-AwareGen:Variant.Cerbu.154900
McAfee-GW-EditionBehavesLike.Win32.Dropper.wc
Trapminesuspicious.low.ml.score
EmsisoftGen:Variant.Cerbu.154900 (B)
IkarusTrojan.BlueWushu
GDataGen:Variant.Cerbu.154900
AviraTR/AD.Nekark.yrnly
MAXmalware (ai score=85)
ArcabitTrojan.Cerbu.D25D14
MicrosoftTrojan:Win32/Wacatac.B!ml
GoogleDetected
AhnLab-V3Malware/Win.Malware-gen.C5213610
MalwarebytesRiskWare.SpyrixKeylogger
TrendMicro-HouseCallTROJ_GEN.R002H0CJR22
MaxSecureTrojan.Malware.109653022.susgen
FortinetW32/Agent.45D7!tr
AVGWin32:Malware-gen
PandaTrj/Chgt.AD

How to remove Trojan.Win32.Convagent.aao?

Trojan.Win32.Convagent.aao removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment