Trojan

Trojan.Win32.Injuke.jike malicious file

Malware Removal

The Trojan.Win32.Injuke.jike is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Injuke.jike virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Behavioural detection: Transacted Hollowing
  • Detects Bochs through the presence of a registry key
  • Created a service that was not started
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan.Win32.Injuke.jike?


File Info:

name: 212F6DAB84795404BBFC.mlw
path: /opt/CAPEv2/storage/binaries/24ffe3edf2363451ccb26c2527ac6709b5ee7c5ba0a20ca50f0523efaee040fa
crc32: 5E4E688B
md5: 212f6dab84795404bbfcdbb322261742
sha1: 577158b8c1444e91911da1814673274f3e1cd4e3
sha256: 24ffe3edf2363451ccb26c2527ac6709b5ee7c5ba0a20ca50f0523efaee040fa
sha512: 0650e5dc2923b116a3adfc8343bdf75a7c5dd1d4b6838218ede7c7cfad0eb9bdc7782271db42b910e79d8c267ae7ba15feefd33118ed0320db651ca1190c226b
ssdeep: 98304:VchHMKyDyc70SwAvO01JgBixtqMhlE4f+Ue/czLiRZvcFqhblsXlwagEblE:uy3l80DBl5f+2QvQus1zgCu
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19E4633AE97D0E53CD350CCB4C82F52902532B7BB36394984118D49ACB7663E8B47E7DA
sha3_384: 0bff7a5174286170897fc3c5c2604ae4cc95f536de84376dea2f062be3418d5d7b315fa5716b44d3bb820bc24c978480
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 2023-11-24 10:02:15

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: CrossTV Setup
FileVersion:
LegalCopyright:
ProductName: CrossTV
ProductVersion:
Translation: 0x0000 0x04b0

Trojan.Win32.Injuke.jike also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Injuke.16!c
DrWebTrojan.Siggen22.14944
SkyhighBehavesLike.Win32.ObfuscatedPoly.tc
McAfeeArtemis!212F6DAB8479
Cylanceunsafe
ZillyaTrojan.Convagent.Win32.450142
K7AntiVirusTrojan ( 005722fe1 )
AlibabaTrojan:Win32/Injuke.16054cdd
K7GWTrojan ( 005722fe1 )
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 99)
APEXMalicious
KasperskyTrojan.Win32.Injuke.jike
AvastOther:Malware-gen [Trj]
TencentWin32.Trojan.Injuke.Gtgl
F-SecureHeuristic.HEUR/AGEN.1332570
SophosMal/Generic-S
IkarusTrojan-Dropper.Win32.Agent
JiangminTrojan.Ekstak.ciey
VaristW32/Agent.HVM.gen!Eldorado
AviraHEUR/AGEN.1332570
KingsoftWin32.Trojan.Injuke.jike
MicrosoftTrojan:Win32/ICLoader.JL!MTB
ZoneAlarmTrojan.Win32.Injuke.jike
GDataWin32.Trojan.Agent.0CMK5S
AhnLab-V3Trojan/Win.DownloadAssistant.R621621
MalwarebytesTrojan.Dropper
TrendMicro-HouseCallTROJ_GEN.R002H0CKO23
YandexTrojan.Injuke!EpNSjuIIBuA
MaxSecureTrojan.Malware.220723021.susgen
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Win32.Injuke.jike?

Trojan.Win32.Injuke.jike removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment