Trojan

Trojan.Win32.Staser.elck removal tips

Malware Removal

The Trojan.Win32.Staser.elck is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Staser.elck virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Sniffs keystrokes
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Network activity detected but not expressed in API logs
  • Likely virus infection of existing system binary

How to determine Trojan.Win32.Staser.elck?


File Info:

name: AE5056057E3C704A6458.mlw
path: /opt/CAPEv2/storage/binaries/d9e6c268d22a4fa278dea01a0a468b3ba7e56520765bfc3973f7de247a3add23
crc32: BDD296D3
md5: ae5056057e3c704a64586052cead931a
sha1: 37267d56ac020d2cac304eb31418abb584e57f03
sha256: d9e6c268d22a4fa278dea01a0a468b3ba7e56520765bfc3973f7de247a3add23
sha512: 1bec6549bda01b36c086b96b0da325047c29e38ae7aa213262c59228fdfb0e06131496e8fe33e2ecee2677e4074c19cb3ab31de8aba5825d0fe2d232ad186517
ssdeep: 49152:9csQ6QS27w7Z+94JI+q8WBRX/TqKzn3+HpvaRjHh:91QTTc8+I+/QXbB7FpHh
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T151E5F127B285A53EC45D27354673A05058FBBEADF916BE2636E4F48DCF320C00E3A665
sha3_384: 66585c2bb14fc36ad79f5b0ecc37d56372e6bc4cc10b92b8aea702c70a42cb4eafae80e9c0d89a983766c22009b121bb
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2021-07-22 05:43:38

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: Cot Logic
FileDescription: CotList Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: CotList
ProductVersion: 0.8.1.0
Translation: 0x0000 0x04b0

Trojan.Win32.Staser.elck also known as:

LionicTrojan.Win32.Staser.4!c
MicroWorld-eScanTrojan.GenericKD.47460890
FireEyeTrojan.GenericKD.47460890
ALYacTrojan.GenericKD.47460890
MalwarebytesAdware.DownloadAssistant
K7AntiVirusTrojan ( 0057e05e1 )
AlibabaTrojanDropper:Win32/Staser.d119c94c
K7GWTrojan ( 0057e05e1 )
CyrenW32/Addrop.L.gen!Eldorado
SymantecTrojan.Gen.MBT
ESET-NOD32Win32/TrojanDropper.Addrop.DH
TrendMicro-HouseCallTROJ_GEN.R002H0CKL21
KasperskyTrojan.Win32.Staser.elck
BitDefenderTrojan.GenericKD.47460890
AvastWin32:Trojan-gen
Ad-AwareTrojan.GenericKD.47460890
EmsisoftTrojan.GenericKD.47460890 (B)
McAfee-GW-EditionBehavesLike.Win32.Dropper.vc
SophosMal/Generic-S
IkarusTrojan-Dropper.Win32.Addrop
AviraHEUR/AGEN.1143627
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataTrojan.GenericKD.47460890
CynetMalicious (score: 100)
McAfeeArtemis!AE5056057E3C
MAXmalware (ai score=80)
APEXMalicious
YandexTrojan.Staser!Ir/dEshZQBs
FortinetW32/Addrop.DH!tr
AVGWin32:Trojan-gen
PandaTrj/CI.A

How to remove Trojan.Win32.Staser.elck?

Trojan.Win32.Staser.elck removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment