Trojan

About “TrojanDownloader:Win32/Tugspay!pz” infection

Malware Removal

The TrojanDownloader:Win32/Tugspay!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What TrojanDownloader:Win32/Tugspay!pz virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Performs HTTP requests potentially not found in PCAP.
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Spanish (Modern)
  • Authenticode signature is invalid
  • Detects Bochs through the presence of a registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Attempted to write directly to a physical drive
  • Attempts to modify proxy settings
  • Touches a file containing cookies, possibly for information gathering
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

How to determine TrojanDownloader:Win32/Tugspay!pz?


File Info:

name: B989AEDA1732D5797F9F.mlw
path: /opt/CAPEv2/storage/binaries/88417f3c0a77bd96521308ea51133a490e5f052aec24e1bb6919f5d0935a1e7d
crc32: D2E875D7
md5: b989aeda1732d5797f9f07d55d0508d0
sha1: 32045cf1c65b790fde42fc44bebdfad1656dbf21
sha256: 88417f3c0a77bd96521308ea51133a490e5f052aec24e1bb6919f5d0935a1e7d
sha512: a56b6113ed60c00465e001f7d81a10c3d3d9110cf507f09210c0bca8c0ff94962549915744b863af6be8cea6463c862339582779c602c111fcaf1145eee02ffc
ssdeep: 24576:cTrjT9vtW+vb/XAYez3ymqXSGGvGGvGGvGGpA:YrjT9ZsYMfqXSGGvGGvGGvGGW
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T11F057C2937EACE62E45E4B368055C8651272BC134B81FBAB3ACD6BED0D753C06F51287
sha3_384: 774c47072869036bfd1916bdcb96090248432d1a4f92815a38a1225a195da5f8e15ab7422f966ffac1015c8193bf6456
ep_bytes: e86a3b0000e939feffff558bec837d08
timestamp: 2014-06-04 22:49:15

Version Info:

0: [No Data]

TrojanDownloader:Win32/Tugspay!pz also known as:

BkavW32.AIDetectMalware
LionicAdware.MSIL.Generic.lZ0B
tehtrisGeneric.Malware
MicroWorld-eScanApplication.Bundler.DomaIQ.C
FireEyeGeneric.mg.b989aeda1732d579
CAT-QuickHealAdware.DomaIQ.BT5
SkyhighCryptDomaIQ
McAfeeCryptDomaIQ
MalwarebytesGeneric.Malware.AI.DDS
VIPREApplication.Bundler.DomaIQ.C
SangforTrojan.Win32.Save.a
K7AntiVirusAdware ( 004b9d501 )
AlibabaAdWare:Win32/DomaIQ.7067ffbb
K7GWAdware ( 004b9d501 )
Cybereasonmalicious.a1732d
BaiduWin32.Adware.DomnIQ.l
VirITAdware.Win32.DomaIQ.EP
SymantecPUA.Gen.2
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/DomaIQ.BB potentially unwanted
APEXMalicious
TrendMicro-HouseCallTROJ_GEN.R002C0CBJ24
AvastWin32:DomaIQ-EM [PUP]
ClamAVWin.Adware.Domaiq-1
Kasperskynot-a-virus:HEUR:AdWare.MSIL.DomaIQ.heur
BitDefenderApplication.Bundler.DomaIQ.C
NANO-AntivirusRiskware.Win32.Lollipop.damaru
SUPERAntiSpywarePUP.DomaIQ/Variant
TencentAdware.Win32.Domaiq.16000414
EmsisoftApplication.Generic (A)
F-SecurePotentialRisk.PUA/DomaIQ.Gen
DrWebTrojan.Packed.27644
ZillyaAdware.DomaIQ.Win32.303
TrendMicroTROJ_GEN.R002C0CBJ24
Trapminemalicious.high.ml.score
SophosDomaIQ pay-per install (PUA)
SentinelOneStatic AI – Malicious PE
MAXmalware (ai score=99)
JiangminAdWare/Lollipop.ew
WebrootPua.Downloadmgr
GoogleDetected
AviraPUA/DomaIQ.Gen
VaristW32/DomaIQ.J.gen!Eldorado
Antiy-AVLGrayWare[AdWare]/MSIL.DomaIQ
Kingsoftmalware.kb.a.992
MicrosoftTrojanDownloader:Win32/Tugspay!pz
XcitiumMalware@#1qojqxe90nb7j
ArcabitApplication.Bundler.DomaIQ.C
ViRobotAdware.Domaiq.803832
ZoneAlarmnot-a-virus:HEUR:AdWare.MSIL.DomaIQ.heur
GDataWin32.Trojan.PSE.141FS7S
AhnLab-V3PUP/Win32.DomaIQ.R111884
Acronissuspicious
ALYacApplication.Bundler.DomaIQ.C
VBA32BScope.Adware.MSIL.DomaIQ
Cylanceunsafe
PandaPUP/MultiToolbar.A
RisingDownloader.Tugspay!1.A14B (CLASSIC)
YandexPUA.DomaIQ!6O7d9nPPcDo
IkarusAdWare.DomaIQ
MaxSecureAdware.WIN32.Lollipop.brsc_220672
FortinetRiskware/DomaIQ
AVGWin32:DomaIQ-EM [PUP]
DeepInstinctMALICIOUS
CrowdStrikewin/grayware_confidence_100% (W)
alibabacloudTrojan:Win/Tugspay.BCD(dyn)

How to remove TrojanDownloader:Win32/Tugspay!pz?

TrojanDownloader:Win32/Tugspay!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment