Trojan

Should I remove “Trojan.Win32.Fabookie.vn”?

Malware Removal

The Trojan.Win32.Fabookie.vn is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Fabookie.vn virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Compression (or decompression)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Attempts to connect to a dead IP:Port (14 unique times)
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Starts servers listening on 127.0.0.1:0
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Looks up the external IP address
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Detects Sandboxie through the presence of a library
  • Detects Avast Antivirus through the presence of a library
  • Forces a created process to be the child of an unrelated process
  • Queries information on disks, possibly for anti-virtualization
  • Checks for the presence of known windows from debuggers and forensic tools
  • A process attempted to delay the analysis task by a long amount of time.
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Steals private information from local Internet browsers
  • Behavior consistent with a dropper attempting to download the next stage.
  • Mimics the file times of a Windows system file
  • Network activity contains more than one unique useragent.
  • Exhibits possible ransomware file modification behavior
  • Writes a potential ransom message to disk
  • Creates a hidden or system file
  • Checks the version of Bios, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Attempts to modify proxy settings
  • Attempts to disable Windows Defender
  • Attempts to create or modify system certificates
  • Collects information to fingerprint the system
  • Uses suspicious command line tools or Windows utilities

Related domains:

razino.xyz
ipinfo.io
olegf9844.tumblr.com
flamkravmaga.com
www.anderesitebrauchen.com
i.spesgrt.com
www.tjhzbzj.com
privacytoolsforyoufree.xyz
name-usa.info
cdn.discordapp.com
a.xyzgame.vip
ocsp.digicert.com
apps.identrust.com
www.listincode.com
gcl-partners.in
iplogger.com
crl.identrust.com
iplis.ru
crl3.digicert.com
iplogger.org
x1.c.lencr.org
statuse.digitalcertvalidation.com
ocsp.comodoca.com
ip-api.com
r3.o.lencr.org
crl.comodoca.com
ocsp.usertrust.com
ocsp.sectigo.com
crl.usertrust.com
usa01.info
www.facebook.com
google.vrthcobj.com
by.dirfgame.com
ol.gamegame.info

How to determine Trojan.Win32.Fabookie.vn?


File Info:

crc32: B3ED22C4
md5: ca8c28106ef4cf7701356bd97e2ebed2
name: CA8C28106EF4CF7701356BD97E2EBED2.mlw
sha1: be2a4ae8f81547cefa42d31234df5f69555a3ef1
sha256: 8c7964362c125bf14139540436ac14612f600b36b92fe85f5a63cbf0090ce3d5
sha512: 1dfc7186c43be50299a758500d17158e2ba1a313e4461344d2d5689f0a990d7f4f3c4f7f3689af8644f93dc63277f50fef44d403c54e1539a1dff2bbc59296a8
ssdeep: 49152:xcB4PkZVi7iKiF8cUvFyPSwCg9yp4GuMaMUaCG4pfwd25XQhGTEwJ84vLRaBtIlK:xOri7ixZUvFyPfCpptv79C3poiCCvLUn
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (c) 1999-2018 Igor Pavlov
InternalName: 7zS.sfx
FileVersion: 19.00
CompanyName: Igor Pavlov
ProductName: 7-Zip
ProductVersion: 19.00
FileDescription: 7z Setup SFX
OriginalFilename: 7zS.sfx.exe
Translation: 0x0409 0x04b0

Trojan.Win32.Fabookie.vn also known as:

K7AntiVirusTrojan ( 0057f23b1 )
LionicTrojan.Win32.Chapak.4!c
DrWebTrojan.Inject4.13781
CynetMalicious (score: 99)
CAT-QuickHealTrojan.Agent
ALYacGen:Variant.Jaik.46512
CylanceUnsafe
SangforTrojan.Win32.Chapak.gen
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojan:Win32/Azorult.c971905d
K7GWTrojan ( 0057f23b1 )
CyrenW32/Trojan.VJVU-7820
SymantecML.Attribute.HighConfidence
ESET-NOD32multiple detections
APEXMalicious
AvastWin32:MalwareX-gen [Trj]
ClamAVWin.Packed.Barys-9859531-0
KasperskyTrojan.Win32.Fabookie.vn
BitDefenderGen:Variant.Doina.18500
NANO-AntivirusTrojan.Win32.Chapak.ixmwas
MicroWorld-eScanGen:Variant.Doina.18500
SophosMal/Generic-S
BitDefenderThetaGen:NN.ZemsilF.34796.ku0@aKjw2pl
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_GEN.R067C0PGD21
McAfee-GW-EditionRDN/Generic.com
FireEyeGen:Variant.Doina.18500
EmsisoftTrojan.GenericKD.37233029 (B)
JiangminTrojan.Sdum.rm
AviraTR/Crypt.Agent.woetv
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Azorult.RM!MTB
ArcabitTrojan.Doina.D4844
GDataMSIL.Trojan-Stealer.NetSteal.3ITRXY
AhnLab-V3Trojan/Win.Azorult.C4553622
McAfeeArtemis!CA8C28106EF4
MAXmalware (ai score=84)
VBA32Trojan.Inject
MalwarebytesMalware.AI.3929834205
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_GEN.R067C0PGD21
IkarusTrojan.Win32
MaxSecureTrojan.Malware.10374761.susgen
FortinetW32/PossibleThreat
AVGWin32:MalwareX-gen [Trj]
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.Crypt.HgIASYUA

How to remove Trojan.Win32.Fabookie.vn?

Trojan.Win32.Fabookie.vn removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment