Trojan

Trojan.Win32.Injuke.febn information

Malware Removal

The Trojan.Win32.Injuke.febn is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Injuke.febn virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Macedonian
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Trojan.Win32.Injuke.febn?


File Info:

name: 089479CB60AF44C5149B.mlw
path: /opt/CAPEv2/storage/binaries/1ea3cdd9cde120b1b52eedf6e8bea5cf5d5dbc10d051ce4a60fc924ba864672c
crc32: B309D3E3
md5: 089479cb60af44c5149b4af5cac8d55c
sha1: 84e0edba76b84d1cd5c1541c7504a7881ea81a62
sha256: 1ea3cdd9cde120b1b52eedf6e8bea5cf5d5dbc10d051ce4a60fc924ba864672c
sha512: 742eca8c032352bd85dbd0f6bfe538ef19fbbe7a8d96794a20c0f88df9aecc7341795f7fe93a951489a0538b72171b1b52c73a07b2ebbc8c6a648757cd1baed0
ssdeep: 6144:jBrSYson5sjnHm1vg2KkwoCwPBe6181K2L:jZSFwsrmifo46181p
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T18E64BF1273C0D033D19325754926C7B68EBE74B0266A6ACBBBC81B7D5F347D1A63630A
sha3_384: 8b764bb3665028d0984bd3d51161683ba819df541f2aa4660a4e51226c9c7bdce41c86fde867ddd3757fc4370d963a0f
ep_bytes: e8bf890000e978feffff8bff558bec83
timestamp: 2021-05-10 01:57:10

Version Info:

FileVers: 65.51.36.16
ProductVersa: 7.50.25.71
InternalName: eatemas
LegalCopyrighd: Jdfglsdffa
Translations: 0x0169 0x0300

Trojan.Win32.Injuke.febn also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
FireEyeGeneric.mg.089479cb60af44c5
McAfeePacked-GBE!089479CB60AF
CylanceUnsafe
K7AntiVirusRiskware ( 0040eff71 )
AlibabaTrojan:Win32/Kryptik.50f42241
K7GWRiskware ( 0040eff71 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZexaF.34084.uq0@aOlmWXoG
CyrenW32/Kryptik.FXB.gen!Eldorado
SymantecPacked.Generic.620
ESET-NOD32a variant of Win32/Kryptik.HNOO
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Injuke.febn
BitDefenderGen:Heur.Mint.Titirez.uq0@nPlmWXoG
MicroWorld-eScanGen:Heur.Mint.Titirez.uq0@nPlmWXoG
AvastWin32:CrypterX-gen [Trj]
Ad-AwareGen:Heur.Mint.Titirez.uq0@nPlmWXoG
EmsisoftTrojan.Crypt (A)
DrWebTrojan.PWS.Stealer.31631
McAfee-GW-EditionBehavesLike.Win32.Emotet.fh
SophosMal/Generic-S + Troj/Krypt-BO
IkarusBackdoor.Win32.Kredoor
GDataGen:Heur.Mint.Titirez.uq0@nPlmWXoG
WebrootW32.Trojan.Gen
AviraTR/Crypt.Agent.bqwvm
KingsoftWin32.Hack.Undef.(kcloud)
GridinsoftRansom.Win32.Sabsik.sa
MicrosoftTrojan:Win32/Azorult.RM!MTB
AhnLab-V3CoinMiner/Win.Glupteba.R456355
Acronissuspicious
VBA32TrojanRansom.LockbitCrypt
ALYacGen:Heur.Mint.Titirez.uq0@nPlmWXoG
MAXmalware (ai score=88)
MalwarebytesTrojan.MalPack.GS
TrendMicro-HouseCallTROJ_GEN.R002H09L621
RisingTrojan.Kryptik!1.DAF8 (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.HNOL!tr
AVGWin32:CrypterX-gen [Trj]
Cybereasonmalicious.a76b84
PandaTrj/Genetic.gen

How to remove Trojan.Win32.Injuke.febn?

Trojan.Win32.Injuke.febn removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment