Trojan

Trojan.Win32.Yakes.sut (file analysis)

Malware Removal

The Trojan.Win32.Yakes.sut is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Yakes.sut virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Trojan.Win32.Yakes.sut?


File Info:

name: F514C2FB956C03191069.mlw
path: /opt/CAPEv2/storage/binaries/88859b17255f500a322e27b5b5557c634e4f5fc2e2702db210af6a1639c62a89
crc32: 854DE27F
md5: f514c2fb956c03191069fec320dfa357
sha1: 0a20fba47d4a89efb73c3b7cb8e176b55241ee58
sha256: 88859b17255f500a322e27b5b5557c634e4f5fc2e2702db210af6a1639c62a89
sha512: 78f94efc6f3b3c690a73af0a215118a3bd55ff932982770d29e2de012ae880c310e59fc31416447ee57ea9b1fb479456876942b855652cac122f4fb3009fcaad
ssdeep: 1536:3RezjWjLSnahycRG9H1n3uJzg8WcVX11FR1/:3EzKjWnC4VafWOHfB
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T10573A45B9AAC4428DBE1117112F52F36931CE646010E8C51B2B5FA46FE3FB7E0B265B3
sha3_384: e730cf7d9f1f0feacd61c49453069e03df5bfe9f615105fbba8b7383a601a0e9928d8ee2a978cfec2a9792e9cd9a9101
ep_bytes: 6681fc00ff5459724d9068ab8fbfff5a
timestamp: 2012-08-13 07:35:05

Version Info:

0: [No Data]

Trojan.Win32.Yakes.sut also known as:

BkavW32.AIDetect.malware2
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.VIZ.Gen.1
ClamAVWin.Packed.Kelihos-9756629-0
FireEyeGeneric.mg.f514c2fb956c0319
CAT-QuickHealTrojanPWS.Zbot.Gen
ALYacTrojan.VIZ.Gen.1
CylanceUnsafe
VIPRETrojan.VIZ.Gen.1
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 0040f72a1 )
K7GWTrojan ( 0040f72a1 )
Cybereasonmalicious.b956c0
BaiduWin32.Trojan.Kryptik.al
CyrenW32/S-05d5c376!Eldorado
SymantecPacked.Generic.449
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.BMMA
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Yakes.sut
BitDefenderTrojan.VIZ.Gen.1
NANO-AntivirusTrojan.Win32.Yakes.cqagjj
SUPERAntiSpywareTrojan.Agent/Gen-Kryptik
AvastWin32:Downloader-UWY [Trj]
Ad-AwareTrojan.VIZ.Gen.1
EmsisoftTrojan.VIZ.Gen.1 (B)
ComodoTrojWare.Win32.Kryptik.BLUG@546mmt
DrWebTrojan.Inject1.30235
TrendMicroBKDR_KELIHOS.SMF
McAfee-GW-EditionBehavesLike.Win32.Upatre.lc
Trapminemalicious.high.ml.score
SophosML/PE-A
SentinelOneStatic AI – Malicious PE
GDataTrojan.VIZ.Gen.1
AviraTR/Kryptik.7732846
MAXmalware (ai score=82)
Antiy-AVLTrojan/Generic.ASMalwS.24F
KingsoftWin32.Troj.Yakes.do.(kcloud)
ArcabitTrojan.VIZ.Gen.1
MicrosoftRansom:Win32/Urausy.E
GoogleDetected
AhnLab-V3Trojan/Win32.Yakes.R87984
Acronissuspicious
McAfeeGeneric-FANP!F514C2FB956C
VBA32Heur.Trojan.Hlux
MalwarebytesTrojan.MalPack.FFS
TrendMicro-HouseCallBKDR_KELIHOS.SMF
RisingTrojan.Antier!1.9D9B (CLASSIC)
YandexTrojan.GenAsa!YXhPhCyWq8Y
IkarusVirus.Agent
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.BDPK!tr
BitDefenderThetaGen:NN.ZexaF.34592.eqX@aKkB@@pm
AVGWin32:Downloader-UWY [Trj]
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Win32.Yakes.sut?

Trojan.Win32.Yakes.sut removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment