Trojan

Trojan.Win32.Zenpak.asvz removal guide

Malware Removal

The Trojan.Win32.Zenpak.asvz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Zenpak.asvz virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • A named pipe was used for inter-process communication
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • A process created a hidden window
  • Performs some HTTP requests
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • A system process is generating network traffic likely as a result of process injection
  • Installs itself for autorun at Windows startup
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

www.ip-adress.com

How to determine Trojan.Win32.Zenpak.asvz?


File Info:

crc32: 54241A5A
md5: 35a2d3bcf4d18b1271e5ad79026c437d
name: upload_file
sha1: b8e150b9e0290eef4b3b64839bf4b42d745d1b43
sha256: acb7c14a2daca20d57f5bb22a13bd47847af63f6a05ead897b440174e7506888
sha512: 706ab2fc524d7c26132ada8bc4c6044477da8cb15eacb25cedb511bb6148cc367f15bf11f03be9525cfadbb63c0eef7c9fef9757f605a198172e745dc0ddb00e
ssdeep: 12288:/2mJnJHUrcxNxIxfxNxnxNxIWxNxsyRxNxRxNx0xNx6gtKO2JO9:V5cJkMO
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan.Win32.Zenpak.asvz also known as:

Elasticmalicious (high confidence)
DrWebBackDoor.Qbot.538
MicroWorld-eScanTrojan.GenericKDZ.69492
FireEyeGeneric.mg.35a2d3bcf4d18b12
CAT-QuickHealTrojan.Qakbot
ALYacTrojan.GenericKDZ.69492
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
SangforMalware
CrowdStrikewin/malicious_confidence_60% (W)
BitDefenderTrojan.GenericKDZ.69492
K7GWTrojan ( 0056ca3f1 )
K7AntiVirusTrojan ( 0056ca3f1 )
Invinceaheuristic
CyrenW32/S-68f5c07d!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:DangerousSig [Trj]
KasperskyTrojan.Win32.Zenpak.asvz
AlibabaBackdoor:Win32/Qakbot.f150541a
Ad-AwareTrojan.GenericKDZ.69492
Comodo.UnclassifiedMalware@0
F-SecureTrojan.TR/Crypt.Agent.eiezj
ZillyaTrojan.Zenpak.Win32.2634
TrendMicroBackdoor.Win32.QAKBOT.SMF
SophosMal/EncPk-APV
SentinelOneDFI – Malicious PE
JiangminTrojan.Zenpak.cug
AviraTR/Crypt.Agent.eiezj
Antiy-AVLGrayWare/Win32.Kryptik.ehls
MicrosoftTrojan:Win32/Qakbot.VD!Cert
ArcabitTrojan.Generic.D10F74
ZoneAlarmTrojan.Win32.Zenpak.asvz
GDataWin32.Trojan.PSE.18ZVOBW
CynetMalicious (score: 100)
McAfeeW32/PinkSbot-HA!35A2D3BCF4D1
MAXmalware (ai score=82)
VBA32BScope.Trojan.Encoder
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Kryptik.HFNZ
TrendMicro-HouseCallBackdoor.Win32.QAKBOT.SMF
RisingTrojan.Kryptik!1.CA76 (CLOUD)
IkarusTrojan.Win32.Krypt
FortinetW32/Qbot.FS!tr
AVGWin32:DangerousSig [Trj]
Cybereasonmalicious.9e0290
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.9ad

How to remove Trojan.Win32.Zenpak.asvz?

Trojan.Win32.Zenpak.asvz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment