Trojan

Trojan.Win32.Inject.pef removal tips

Malware Removal

The Trojan.Win32.Inject.pef is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Inject.pef virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Injection with CreateRemoteThread in a remote process
  • Attempts to connect to a dead IP:Port (3 unique times)
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Mimics the system’s user agent string for its own requests
  • A process attempted to delay the analysis task.
  • A named pipe was used for inter-process communication
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • A process created a hidden window
  • Performs some HTTP requests
  • Uses Windows utilities for basic functionality
  • Sniffs keystrokes
  • Executed a process and injected code into it, probably while unpacking
  • A system process is generating network traffic likely as a result of process injection
  • Installs itself for autorun at Windows startup
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

www.ip-adress.com

How to determine Trojan.Win32.Inject.pef?


File Info:

crc32: 9D2C6FC1
md5: 3711b0b15f26a0b23ab8f21fce1e095d
name: upload_file
sha1: 14d0b857272a3f354cada758115aa9f67d8558ae
sha256: fc4d6ab38ab3f6d4a248f9bd518353e41080e2ac92ef58867a74624390ff2457
sha512: 1cb9d37f2d61df5785a73006707896d2017387d84b5fabf7f46962044f1bd7a4ad00fff394687c3b87cedcc6534b92b69e02e118a40e22d689ef2c271b1f81ee
ssdeep: 12288:ONZsBT5w44r6gL74hxWi1ZJUnoRsG3+etdH:ZB8r6uExWi1QnoRV3+etdH
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan.Win32.Inject.pef also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.775983
FireEyeGeneric.mg.3711b0b15f26a0b2
ALYacGen:Variant.Graftor.845797
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
SangforMalware
K7AntiVirusBackdoor ( 0056d6b31 )
BitDefenderGen:Variant.Razy.775983
K7GWBackdoor ( 0056d6b31 )
Cybereasonmalicious.7272a3
CyrenW32/Kryptik.CGJ.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:DangerousSig [Trj]
ClamAVWin.Packed.Generickdz-9781418-0
KasperskyHEUR:Trojan.Win32.Inject.pef
RisingTrojan.MalCert!1.CDAB (CLASSIC)
Ad-AwareGen:Variant.Razy.775983
SophosMal/EncPk-APW
F-SecureTrojan.TR/AD.Qbot.jxctc
DrWebTrojan.QakBot.34
InvinceaMal/EncPk-APW
McAfee-GW-EditionW32/PinkSbot-HE!3711B0B15F26
EmsisoftMalCert.A (A)
JiangminTrojan.Inject.bmln
AviraTR/AD.Qbot.jxctc
Antiy-AVLTrojan/Win32.Qbot
MicrosoftTrojan:Win32/Qakbot.AR!Cert
ArcabitTrojan.Razy.DBD72F
ZoneAlarmHEUR:Trojan.Win32.Inject.pef
GDataWin32.Trojan.QakBot.R5ZYL5
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.QBot.R353714
McAfeeW32/PinkSbot-HE!3711B0B15F26
MAXmalware (ai score=88)
VBA32Trojan.QakBot
MalwarebytesBackdoor.Qbot.Generic
PandaTrj/Genetic.gen
ESET-NOD32Win32/Qbot.CN
SentinelOneDFI – Malicious PE
FortinetW32/Kryptik.HERT!tr
AVGWin32:DangerousSig [Trj]
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Win32.Inject.pef?

Trojan.Win32.Inject.pef removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment