Trojan

TrojanDownloader:Win32/Tugspay!pz removal instruction

Malware Removal

The TrojanDownloader:Win32/Tugspay!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What TrojanDownloader:Win32/Tugspay!pz virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Performs HTTP requests potentially not found in PCAP.
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Spanish (Modern)
  • Authenticode signature is invalid
  • CAPE detected the shellcode patterns malware family
  • Detects Bochs through the presence of a registry key
  • Attempts to modify proxy settings
  • Touches a file containing cookies, possibly for information gathering
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine TrojanDownloader:Win32/Tugspay!pz?


File Info:

name: B9801128BC6B4A2ACA49.mlw
path: /opt/CAPEv2/storage/binaries/eb6e46c6581d8ab48d626de9a5499151d8f2f765cd8e936d6739b2091f731b57
crc32: 46CEFE4A
md5: b9801128bc6b4a2aca49bc27031b4b60
sha1: 32dd5fbb9492e5873c289d6f47c89c3b2a4ee943
sha256: eb6e46c6581d8ab48d626de9a5499151d8f2f765cd8e936d6739b2091f731b57
sha512: aaf0498cce8f8d34f86baf87ccd51f785d6c2a898f85c8e4d14df1472bf95d93f5a2577e5373be1dc46fa50d71f4c352c91409130e649f78f0d45734035cd17d
ssdeep: 6144:kTLrv+VzfFgD4GFwKoV0q+A6MQCHbLEYa:kTHv+PnGFwKKcMy
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T158849D253794A937E96E4FF98052476087B1C7A39657F78B2C8978EE1DF27800A036C7
sha3_384: 2bbc833e762a9d1e77ea338f2cf9fc736e7cff48d02e6f2b7428cdaa9f84dab0e6e8c9f4b6e8a16f8f2f89182c9a328c
ep_bytes: e81a320000e979feffff6a0c6880e140
timestamp: 2014-03-20 15:28:49

Version Info:

0: [No Data]

TrojanDownloader:Win32/Tugspay!pz also known as:

BkavW32.AIDetectMalware
LionicAdware.Win32.Lollipop.mg2w
tehtrisGeneric.Malware
MicroWorld-eScanApplication.Bundler.DomaIQ.Q
FireEyeGeneric.mg.b9801128bc6b4a2a
CAT-QuickHealAdware.DomaIQ.BT5
SkyhighBehavesLike.Win32.Generic.fh
McAfeeGenericRXGA-GP!B9801128BC6B
MalwarebytesPUP.Optional.BundleInstaller.DDS
ZillyaAdware.DomaIQ.Win32.193
SangforTrojan.Win32.Save.a
K7AntiVirusAdware ( 004b9d501 )
AlibabaAdWare:Win32/DomaIQ.df096aaf
K7GWAdware ( 004bb6fb1 )
BaiduWin32.Adware.DomnIQ.b
VirITAdware.Win32.DomaIQ.BT
SymantecPUA.Gen.2
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/DomaIQ.BB potentially unwanted
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Adware.Domaiq-1
Kasperskynot-a-virus:AdWare.MSIL.DomaIQ.cher
BitDefenderApplication.Bundler.DomaIQ.Q
NANO-AntivirusRiskware.Win32.Lollipop.cvticj
SUPERAntiSpywarePUP.DomaIQ/Variant
AvastWin32:DomaIQ-CC [PUP]
TencentAdware.Win32.Lollipop.f
TACHYONTrojan-Clicker/W32.Lollipop.371136
EmsisoftApplication.Generic (A)
F-SecureAdware:W32/DomaIQ.B
DrWebTrojan.DownLoader11.3971
VIPREApplication.Bundler.DomaIQ.Q
SophosDomaIQ pay-per install (PUA)
SentinelOneStatic AI – Malicious PE
GDataWin32.Trojan.PSE.10PH8RR
JiangminPack.Mal.AntiVM
WebrootPua.Tuguu.Gen
VaristW32/A-350fada1!Eldorado
AviraPUA/DomaIQ.Gen
Antiy-AVLGrayWare[AdWare]/Win32.Lollipop
Kingsoftmalware.kb.a.996
XcitiumApplication.Win32.DomaIQ.PUS@59e31j
ArcabitApplication.Bundler.DomaIQ.Q
ZoneAlarmnot-a-virus:AdWare.MSIL.DomaIQ.cher
MicrosoftTrojanDownloader:Win32/Tugspay!pz
GoogleDetected
AhnLab-V3PUP/Win32.DomaIQ.R102876
Acronissuspicious
ALYacApplication.Bundler.DomaIQ.Q
MAXmalware (ai score=99)
VBA32BScope.Adware.MSIL.DomaIQ
Cylanceunsafe
PandaTrj/Genetic.gen
RisingDownloader.Tugspay!1.A14B (CLASSIC)
IkarusTrojan.Brsecmon
MaxSecurenot-a-virus:Adware.Lolipop.gen
FortinetW32/Generic.AC.28C287!tr
AVGWin32:DomaIQ-CC [PUP]
DeepInstinctMALICIOUS
CrowdStrikewin/grayware_confidence_100% (D)

How to remove TrojanDownloader:Win32/Tugspay!pz?

TrojanDownloader:Win32/Tugspay!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment