Trojan

What is “Trojan.Win32.Miner.tkxg”?

Malware Removal

The Trojan.Win32.Miner.tkxg is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Miner.tkxg virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Russian
  • Authenticode signature is invalid
  • Created a process from a suspicious location
  • Installs itself for autorun at Windows startup
  • Checks for the presence of known devices from debuggers and forensic tools

How to determine Trojan.Win32.Miner.tkxg?


File Info:

name: 429FDCCD47157AFC62DD.mlw
path: /opt/CAPEv2/storage/binaries/54c757a07868adc54db47fa03f359e483cab44749ddaf20509250da0ea468c0e
crc32: CB66D4A2
md5: 429fdccd47157afc62dd09d0cc0d9c85
sha1: 6473e3564820a64d7b6fe67f73343e53db75f837
sha256: 54c757a07868adc54db47fa03f359e483cab44749ddaf20509250da0ea468c0e
sha512: 0a272f00e371f4b93896629bdcd1911f2f4d328f5f555e5a2f9ffa4cf255c53ba873eea71ce6a9443546db26deb1863894d97b19cd4031f63d72d60e3c19a1cb
ssdeep: 49152:Kbch9xFYly3fbf7QX4mpxRrGfkeDe+NorA+:KUjYly3f/QX4wRAkeDmrA+
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16F95235230DBD033E59A1CB16CA1DAB1A6743C3AA5364557BB816F3C7A713E2831AF43
sha3_384: 0c74020534d1865ab903d8ddd5edf579ab68e49bd4c1ba9dcd661763169194a95758dc1d617dabb4dc6d55a1c475b6d8
ep_bytes: e8df650000e978feffff8bff558bec56
timestamp: 2016-02-03 19:38:25

Version Info:

0: [No Data]

Trojan.Win32.Miner.tkxg also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Miner.4!c
MicroWorld-eScanTrojan.GenericKD.3026264
FireEyeGeneric.mg.429fdccd47157afc
McAfeeArtemis!429FDCCD4715
CylanceUnsafe
SangforTrojan.Win32.Miner.tkxg
AlibabaTrojan:Win32/Miner.80655a8e
Cybereasonmalicious.d47157
BitDefenderThetaGen:NN.ZexaF.34182.xn1@aGXlo8g
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of Win32/Packed.PrivateEXEProtector.K suspicious
TrendMicro-HouseCallTROJ_GEN.R002H0CB222
Paloaltogeneric.ml
KasperskyTrojan.Win32.Miner.tkxg
BitDefenderTrojan.GenericKD.3026264
NANO-AntivirusTrojan.Win32.Miner.exmegh
APEXMalicious
TencentWin32.Trojan.Miner.Pbzj
Ad-AwareTrojan.GenericKD.3026264
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionBehavesLike.Win32.Sytro.tc
EmsisoftTrojan.GenericKD.3026264 (B)
IkarusTrojan.VB.Crypt
JiangminBackdoor.Agent.fuo
WebrootW32.Trojan.Gen
AviraTR/AD.Evrial.beswn
MAXmalware (ai score=83)
MicrosoftVirTool:Win32/Vbinder
GDataTrojan.GenericKD.3026264
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Miner.C2393843
VBA32BScope.Trojan.Wacatac
AvastWin32:Malware-gen
RisingDropper.Generic!8.35E (CLOUD)
YandexTrojan.GenAsa!nwmXXAT+DgM
SentinelOneStatic AI – Malicious SFX
AVGWin32:Malware-gen
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_60% (W)

How to remove Trojan.Win32.Miner.tkxg?

Trojan.Win32.Miner.tkxg removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment