Trojan

Trojan.Win32.Staser.ekpz removal tips

Malware Removal

The Trojan.Win32.Staser.ekpz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Staser.ekpz virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Likely virus infection of existing system binary

How to determine Trojan.Win32.Staser.ekpz?


File Info:

name: 7DA68D384EA103C48AD3.mlw
path: /opt/CAPEv2/storage/binaries/086a6129913a88a7b9abcfc8a0de2b978852eac7d6ffe79a7a5bec0e797f86b6
crc32: 73508362
md5: 7da68d384ea103c48ad3459af7f02479
sha1: 5a27e2af175f0db5ffeeeba849f9fbf3a7200d75
sha256: 086a6129913a88a7b9abcfc8a0de2b978852eac7d6ffe79a7a5bec0e797f86b6
sha512: cab49f73b4445d4e48c62c9d7f8808f2238e2d45aae0063bf6a9628eaced95e70a0b0881df4ef3af50b36aa6b6e27cab91fee9f6f67c384ddaf0dacbbce0ed01
ssdeep: 49152:/csQ6QJvEIgSYxFHazmxsQ1LlSMz1kOH9HyYHuH/UYVb9osb2IoQsT:/1QTjYfHsmWaLgMz155yYAChIoQsT
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T111D5F127B288753EC4AD27364673A46058FBB6ADF517BE1636E4C48DCF360C01E3A625
sha3_384: 31c6daad89c4b5b2d1492526fab1bc94915b512a4d50ffc7384634720bd12dc6fb0fdd9c2330cee6a76f073273240d44
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2021-07-22 05:43:38

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: Cot Logic
FileDescription: CotList Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: CotList
ProductVersion: 0.8.0.6
Translation: 0x0000 0x04b0

Trojan.Win32.Staser.ekpz also known as:

BkavW32.AIDetect.malware2
MicroWorld-eScanTrojan.GenericKD.38101077
FireEyeTrojan.GenericKD.38101077
ALYacTrojan.GenericKD.38101077
SangforTrojan.Win32.Staser.ekpz
K7AntiVirusTrojan ( 0057e05e1 )
AlibabaTrojanDropper:Win32/Staser.73669bbe
K7GWTrojan ( 0057e05e1 )
CyrenW32/Addrop.L.gen!Eldorado
SymantecTrojan.Gen.MBT
ESET-NOD32Win32/TrojanDropper.Addrop.DH
TrendMicro-HouseCallTROJ_GEN.R002C0WKQ21
KasperskyTrojan.Win32.Staser.ekpz
BitDefenderTrojan.GenericKD.38101077
AvastWin32:Trojan-gen
Ad-AwareTrojan.GenericKD.38101077
TrendMicroTROJ_GEN.R002C0WKQ21
McAfee-GW-EditionBehavesLike.Win32.Dropper.vc
EmsisoftTrojan.GenericKD.38101077 (B)
IkarusTrojan-Dropper.Win32.Addrop
GDataTrojan.GenericKD.38101077
AviraHEUR/AGEN.1143627
ViRobotTrojan.Win32.Z.Addrop.3013199
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
McAfeeArtemis!7DA68D384EA1
MalwarebytesAdware.DownloadAssistant
APEXMalicious
TencentWin32.Trojan.Staser.Alja
MAXmalware (ai score=86)
FortinetW32/Addrop.DH!tr
AVGWin32:Trojan-gen

How to remove Trojan.Win32.Staser.ekpz?

Trojan.Win32.Staser.ekpz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment