Trojan

How to remove “Trojan.Win32.Convagent.yu”?

Malware Removal

The Trojan.Win32.Convagent.yu is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Convagent.yu virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Deletes executed files from disk
  • Attempts to modify Windows Defender using PowerShell
  • Collects information to fingerprint the system

How to determine Trojan.Win32.Convagent.yu?


File Info:

name: DEC8453BA5EE7A5CA413.mlw
path: /opt/CAPEv2/storage/binaries/352025a4d5a264734b142f0be7913cbf46886cb907d17d3af6004c111f2776e2
crc32: 31E5280B
md5: dec8453ba5ee7a5ca41309fc9a1f45da
sha1: d5cf863558f099108891349047f7efd16db0306e
sha256: 352025a4d5a264734b142f0be7913cbf46886cb907d17d3af6004c111f2776e2
sha512: 875eb934a6e13cebbe2f3f6734794612470df66b8c5be93b7f2d06dc61a512490f7b2f017c13150c4bbe2430f910cc3670910a9de61d9a91af889f1ad90a2746
ssdeep: 98304:XkLh8Hw2ek3xwp7uRMmdAUdCNMYCpADdQRuPy:sh8Hw2VB07uRDdndCNaRRuPy
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1E8E5E03BF268653EC5AA0A3146F39210DD7BAE61641A8C1A17FC370DCF364601FFA656
sha3_384: 773b1fee6e72f456ca2fead8c7b79a31838eba741b3e46f7b5abbd8101debbbc246b941b9dee371e855ce9c6b6f0461f
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2022-04-14 16:10:23

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: - Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: -
ProductVersion: 2.0
Translation: 0x0000 0x04b0

Trojan.Win32.Convagent.yu also known as:

LionicTrojan.Win32.Convagent.4!c
MicroWorld-eScanGen:Variant.Cerbu.154900
FireEyeGen:Variant.Cerbu.154900
ALYacGen:Variant.Cerbu.154900
CylanceUnsafe
SangforTrojan.Win32.Convagent.Vy4p
K7AntiVirusRiskware ( 00584baa1 )
AlibabaTrojan:Win32/Convagent.efb1e4fa
K7GWRiskware ( 00584baa1 )
Cybereasonmalicious.558f09
CyrenW32/BlueWushu.A.gen!Eldorado
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Convagent.yu
BitDefenderGen:Variant.Cerbu.154900
AvastWin32:Malware-gen
TencentTrojan.Win32.Convagent.hf
Ad-AwareGen:Variant.Cerbu.154900
EmsisoftGen:Variant.Cerbu.154900 (B)
VIPREGen:Variant.Cerbu.154900
McAfee-GW-EditionBehavesLike.Win32.DStudio.wc
Trapminesuspicious.low.ml.score
SophosGeneric PUA NF (PUA)
GDataGen:Variant.Cerbu.154900
AviraTR/AD.Nekark.ugkor
MAXmalware (ai score=83)
Antiy-AVLGrayWare/Win32.Cerbu.zlb
ArcabitTrojan.Cerbu.D25D14
MicrosoftTrojan:Win32/Wacatac.B!ml
GoogleDetected
AhnLab-V3Malware/Win.Malware-gen.C5213608
McAfeeArtemis!DEC8453BA5EE
MalwarebytesRiskWare.SpyrixKeylogger
IkarusTrojan.BlueWushu
MaxSecureTrojan.Malware.109653022.susgen
FortinetW32/Agent.45D7!tr
AVGWin32:Malware-gen

How to remove Trojan.Win32.Convagent.yu?

Trojan.Win32.Convagent.yu removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment