Trojan

Trojan.Win32.Staser.elec removal instruction

Malware Removal

The Trojan.Win32.Staser.elec is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Staser.elec virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Attempts to modify desktop wallpaper
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Likely virus infection of existing system binary

How to determine Trojan.Win32.Staser.elec?


File Info:

name: B76E75E3DD2016B3E75F.mlw
path: /opt/CAPEv2/storage/binaries/493c5bf46598221dbb20a0b7595775d8d6efc9aadcec1065cf0853f517361fb8
crc32: 5AAD5744
md5: b76e75e3dd2016b3e75f4ae146c81c7c
sha1: b0c84cd9ca8e318d75548145c59e543236598b7a
sha256: 493c5bf46598221dbb20a0b7595775d8d6efc9aadcec1065cf0853f517361fb8
sha512: 7029ca642a68e1b2ed0ff312927bb34eb32c7b073eb01a52317c73c6c8873c2aa0bd40591c90ba1555375979f4d0004c7f1b020c70fe3da3273d5f489c62faab
ssdeep: 98304:l1QTJ+NJwhXk1QPdRyvSSL/c2REyuLyXYOYOWk:DsCJwZ9dXS3gCYo
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1CFF50127B698653EC4AE27354673A01058FBA66DF417BE1676F0C88CCF761C00E3EA65
sha3_384: 75b8e3db275ca7a7c531556b78dccad4bf03674e5bd847c3ccb94af9ba44a61cf61145f441722e6b82d759d236925179
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2021-07-22 05:43:38

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: Cot Logic
FileDescription: CotList Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: CotList
ProductVersion: 0.8.1.0
Translation: 0x0000 0x04b0

Trojan.Win32.Staser.elec also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Staser.4!c
FireEyeTrojan.GenericKD.38101085
McAfeeArtemis!B76E75E3DD20
K7AntiVirusTrojan ( 0057e05e1 )
AlibabaTrojanDropper:Win32/Staser.d8996431
K7GWTrojan ( 0057e05e1 )
CyrenW32/Addrop.L.gen!Eldorado
SymantecTrojan.Gen.MBT
ESET-NOD32Win32/TrojanDropper.Addrop.DH
TrendMicro-HouseCallTROJ_GEN.R011C0WKO21
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Staser.elec
BitDefenderTrojan.GenericKD.38101085
MicroWorld-eScanTrojan.GenericKD.38101085
AvastWin32:Trojan-gen
TencentWin32.Trojan.Staser.Pfji
Ad-AwareTrojan.GenericKD.38101085
TrendMicroTROJ_GEN.R011C0WKO21
McAfee-GW-EditionBehavesLike.Win32.DStudio.wc
EmsisoftTrojan.GenericKD.38101085 (B)
IkarusTrojan-Dropper.Win32.Addrop
GDataTrojan.GenericKD.38101085
AviraHEUR/AGEN.1143627
MicrosoftTrojan:Win32/Wacatac.B!ml
ALYacTrojan.GenericKD.38101085
MAXmalware (ai score=83)
MalwarebytesAdware.DownloadAssistant
APEXMalicious
YandexTrojan.Staser!zDjhshJ65X0
FortinetW32/Addrop.DH!tr
AVGWin32:Trojan-gen
PandaTrj/CI.A

How to remove Trojan.Win32.Staser.elec?

Trojan.Win32.Staser.elec removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment