Trojan

Trojan.Win32.PowerShell.fgb malicious file

Malware Removal

The Trojan.Win32.PowerShell.fgb is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.PowerShell.fgb virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities to create a scheduled task
  • Attempts to modify Windows Defender using PowerShell

How to determine Trojan.Win32.PowerShell.fgb?


File Info:

name: 314320FF1B46E5DB8D2F.mlw
path: /opt/CAPEv2/storage/binaries/471edea18c46b5357db0e54b3b3eaafe43856fa8ffc140efde5b595dc9e03a6f
crc32: 401C40BC
md5: 314320ff1b46e5db8d2f86e244af3b37
sha1: e3c27aa7d4fc5a7b91467184e94de6a727f579e4
sha256: 471edea18c46b5357db0e54b3b3eaafe43856fa8ffc140efde5b595dc9e03a6f
sha512: 3a4affc3180c2a03fa59c2efcfb751c4186a903388aac3046f8d45af840b08853dfbbeb87756d256f159581dc445d418507e7a97838f85a56917ea7969bb422c
ssdeep: 98304:vXz+3TFL2o+R5l+cxb6v7zUqqEG/sYWPYh+f5Fm3TvltS:fK3TAo+RsUq6/cgVTvvS
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16316333A04C04573D5723A781E17D1B6FA3CFA4C2B7655CEBBDD6B29E87B24009192CA
sha3_384: a6cc7bd0211058fcc7883251d1e0b4d600b3a347623c7c85ef9e26932802a06e993cc070ab0857c81f64488879d96732
ep_bytes: 558bec83c4f0b888534200e824f2fdff
timestamp: 1992-06-19 22:22:17

Version Info:

Comments:
CompanyName: Shattered
FileDescription: Shattered 0.18 Installation
FileVersion: 0.18
LegalCopyright: Shattered
Translation: 0x0409 0x04e4

Trojan.Win32.PowerShell.fgb also known as:

LionicTrojan.Win32.PowerShell.4!c
FireEyeGeneric.mg.314320ff1b46e5db
McAfeeArtemis!314320FF1B46
Cylanceunsafe
SangforCoinMiner.Win64.Agent.V1f6
K7AntiVirusCryptoMiner ( 0051b7f11 )
AlibabaRiskWare:Win64/XMRigMiner.358a5b2a
K7GWCryptoMiner ( 0051b7f11 )
CrowdStrikewin/malicious_confidence_70% (W)
CyrenW64/ABMiner.CMQW-4898
SymantecML.Attribute.HighConfidence
Elasticmalicious (moderate confidence)
ESET-NOD32a variant of Win64/CoinMiner.FQ
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan.Win32.PowerShell.fgb
NANO-AntivirusRiskware.Win64.CoinMiner.jvaaru
AvastWin64:Evo-gen [Trj]
TencentWin64.Trojan.Coinminer.Bnhl
F-SecureHeuristic.HEUR/AGEN.1324378
DrWebTool.Nssm.6
TrendMicroTROJ_GEN.R002C0RD723
McAfee-GW-EditionBehavesLike.Win32.Dropper.rc
SophosMal/Generic-R
SentinelOneStatic AI – Suspicious PE
GoogleDetected
AviraHEUR/AGEN.1324378
Antiy-AVLGrayWare/Win64.CoinMiner.xmr
ZoneAlarmTrojan.Win32.PowerShell.fgb
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
MalwarebytesMalware.AI.147961380
TrendMicro-HouseCallTROJ_GEN.R002C0RD723
RisingHackTool.VulnDriver/x64!1.D7DB (CLASSIC:bWQ1OhgkHoThvyMw)
IkarusTrojan.Win64.CoinMiner
FortinetW32/CoinMiner.FQ!tr
AVGWin64:Evo-gen [Trj]
DeepInstinctMALICIOUS

How to remove Trojan.Win32.PowerShell.fgb?

Trojan.Win32.PowerShell.fgb removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment