Trojan

Trojan.Win32.Staser.elds (file analysis)

Malware Removal

The Trojan.Win32.Staser.elds is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Staser.elds virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Likely virus infection of existing system binary

How to determine Trojan.Win32.Staser.elds?


File Info:

name: 4D55E3B3DB6761557C57.mlw
path: /opt/CAPEv2/storage/binaries/608f0e807322d1a13b427ef1ab7d1590e37329173d2fe7e065fc8ee08bfefce6
crc32: 5A1A869B
md5: 4d55e3b3db6761557c575e9d8deaa7ee
sha1: b1c433019e0b69536d2ad5fca82f194b333e90f3
sha256: 608f0e807322d1a13b427ef1ab7d1590e37329173d2fe7e065fc8ee08bfefce6
sha512: a5b8a9370d99d32e4f3d0414d9a602eb124b3849dc10dac8541a4ad11610b2e1111c778ed18c0ad3ccdabd7867593bac532609b7521fc118f31cdb95d7911a5b
ssdeep: 49152:ZcsQ6QwKUP1Cpgk9zhuF82HDOFfvxsBfh8sPnI0Lmniuvqd2W0dZjOY:Z1QTwKUPwpJ9zhQPAqZnImmnXqdadZjh
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1BCE5F127B248653EC47A27394573A01098FFAA69F616AE1773E1D48DCF710C40F3AAB5
sha3_384: 8062ba482326ed46b286654891a58a3a1daf453d54f41c809c67274762efa16990fc67790af16b7463cc7cdec7c285ea
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2021-07-22 05:43:38

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: Cot Logic
FileDescription: CotList Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: CotList
ProductVersion: 0.8.1.0
Translation: 0x0000 0x04b0

Trojan.Win32.Staser.elds also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Staser.4!c
MicroWorld-eScanAdware.GenericKD.38135120
FireEyeAdware.GenericKD.38135120
McAfeeArtemis!4D55E3B3DB67
SangforTrojan.Win32.Addrop.DH
K7AntiVirusTrojan ( 0057e05e1 )
AlibabaTrojanDropper:Win32/Staser.1deb307e
K7GWTrojan ( 0057e05e1 )
CyrenW32/Addrop.L.gen!Eldorado
ESET-NOD32Win32/TrojanDropper.Addrop.DH
KasperskyTrojan.Win32.Staser.elds
BitDefenderAdware.GenericKD.38135120
ViRobotTrojan.Win32.Z.Addrop.3084076
AvastWin32:Trojan-gen
Ad-AwareAdware.GenericKD.38135120
EmsisoftAdware.GenericKD.38135120 (B)
TrendMicroTROJ_GEN.R002C0GKU21
McAfee-GW-EditionBehavesLike.Win32.CSDImonetize.vc
SentinelOneStatic AI – Suspicious PE
GDataAdware.GenericKD.38135120
AviraHEUR/AGEN.1143627
GridinsoftRansom.Win32.Wacatac.sa
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.C4786059
ALYacAdware.GenericKD.38135120
MAXmalware (ai score=61)
VBA32Trojan.Staser
MalwarebytesAdware.DownloadAssistant
TrendMicro-HouseCallTROJ_GEN.R002H0AKL21
IkarusTrojan-Dropper.Win32.Addrop
FortinetW32/Addrop.DH!tr
AVGWin32:Trojan-gen
PandaTrj/CI.A

How to remove Trojan.Win32.Staser.elds?

Trojan.Win32.Staser.elds removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment