Trojan

Trojan.Win64.Donut.gcm (file analysis)

Malware Removal

The Trojan.Win64.Donut.gcm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win64.Donut.gcm virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Created a process from a suspicious location
  • Collects and encrypts information about the computer likely to send to C2 server
  • Creates a hidden or system file
  • Attempts to modify Windows Defender using PowerShell

How to determine Trojan.Win64.Donut.gcm?


File Info:

name: 1087ED8D18CD78E41AD5.mlw
path: /opt/CAPEv2/storage/binaries/12cc24d8b8111f8d30d2e1ed63fbf304f1715f6946cf787743e3d184f6e7117a
crc32: 8E568EE9
md5: 1087ed8d18cd78e41ad533a6cbfadd53
sha1: e2f112a33218697c3c7d6fb5b879da9e9eb0b758
sha256: 12cc24d8b8111f8d30d2e1ed63fbf304f1715f6946cf787743e3d184f6e7117a
sha512: 68253ac60372fedffb66b980c3e4e5a74fb7b8c0fb2dde7b41093035e1be04fab18ea325e0b84bfc83b16cb39060cbe95335262c19f08645eae429198d2643ec
ssdeep: 196608:KPvuP+1W0qR6fcsZrm8YoAGbByVxkZIz26GIeswIgF:KPp1SR6fdOomVtwZ
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1F67613B5D3AC80057857325ED6057CC3989A686E5FD34CA0339CA8103E5893AE797BEF
sha3_384: 65ce6a9268cc7fab5cb85322de3a31d7678a4632e38ae1b0687751da38776be1358687cc4212e28e4919dd9f35c2e94c
ep_bytes: 5589e581ec0800000090b80400000050
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win64.Donut.gcm also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.FakeAlert.2
ALYacGen:Variant.FakeAlert.2
CylanceUnsafe
K7AntiVirusTrojan ( 005893401 )
K7GWTrojan ( 005893401 )
Cybereasonmalicious.d18cd7
CyrenW32/FakeAlert.AEC.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SOV
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan.Win64.Donut.gcm
BitDefenderGen:Variant.FakeAlert.2
AvastWin32:Trojan-gen
Ad-AwareGen:Variant.FakeAlert.2
EmsisoftTrojan-Dropper.Agent (A)
DrWebTrojan.Siggen15.61719
McAfee-GW-EditionBehavesLike.Win32.PWSZbot.wc
FireEyeGeneric.mg.1087ed8d18cd78e4
SophosMal/Generic-S
IkarusTrojan-Dropper.Win32.Agent
GDataGen:Variant.FakeAlert.2
AviraHEUR/AGEN.1145587
eGambitUnsafe.AI_Score_100%
Antiy-AVLTrojan/Generic.ASMalwS.34E46BA
ArcabitTrojan.FakeAlert.2
MicrosoftTrojan:Win32/Tnega.RR!MTB
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.R443193
McAfeeGenericRXRA-NZ!1087ED8D18CD
MAXmalware (ai score=85)
VBA32BScope.Trojan.Nitol
MalwarebytesTrojan.Dropper
RisingTrojan.Generic@ML.91 (RDML:5M0QNMxoSQJA4cZK7c3OXA)
FortinetW32/Tiny.NFR!tr
BitDefenderThetaGen:NN.ZexaF.34062.@tW@aux1fyai
AVGWin32:Trojan-gen
PandaTrj/CI.A

How to remove Trojan.Win64.Donut.gcm?

Trojan.Win64.Donut.gcm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment