Trojan

TrojanDropper:Win32/Aenjaris.CL!bit removal guide

Malware Removal

The TrojanDropper:Win32/Aenjaris.CL!bit is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What TrojanDropper:Win32/Aenjaris.CL!bit virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Unconventionial binary language: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine TrojanDropper:Win32/Aenjaris.CL!bit?


File Info:

name: EC0E258487FA0A4D8415.mlw
path: /opt/CAPEv2/storage/binaries/1529e9a943dd3429a17b0a19ce217023ffc83ba7b96a6d9ddf231ed36ac242cc
crc32: 2156B357
md5: ec0e258487fa0a4d8415694756135585
sha1: 794c4bd609ef6a270c3d34135692c18115bdf434
sha256: 1529e9a943dd3429a17b0a19ce217023ffc83ba7b96a6d9ddf231ed36ac242cc
sha512: 9ce97d8e86942ddd65554a04fbac01459e6b5849bf2197f5dcfe2d614e9fe9dfce27ebeb7ab24a647066b63813aee9b0a61d378103633eaabd74ee28400883b2
ssdeep: 24576:95T/Qtcna+0zpoRihOYY85Hkb9B8zNSzNpuEgU8im:95TItc4zbOX1Y87fg+m
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T15215128A738045B2C79B483548F6963D93756F19837499EBB2C9BB0B4CB21F696343CC
sha3_384: 329ed6b12f9427da32cf43a8331a343c9dc6ce8540ce3cb65662037a349cf8a356b3ed1de103fe5b1df51f2deb3fdc98
ep_bytes: 683c000000680000000068e00e4200e8
timestamp: 2010-09-24 15:34:15

Version Info:

CompanyName:
ProductName:
ProductVersion: 0.0.0.0
FileVersion: 0.0.0.0
FileDescription:
InternalName: 23.exe
OriginalFilename: 23.exe
LegalCopyright:
Email:
Website:
Translation: 0x0419 0x04b0

TrojanDropper:Win32/Aenjaris.CL!bit also known as:

LionicTrojan.Win32.Agent.tn6e
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Encpk.Gen.1
SkyhighBehavesLike.Win32.BadFile.dc
McAfeeArtemis!EC0E258487FA
MalwarebytesGeneric.Malware.AI.DDS
SangforTrojan.Win32.Save.a
AlibabaTrojanDropper:Win32/Aenjaris.67933395
Cybereasonmalicious.487fa0
BaiduWin32.Trojan-Dropper.Agent.dn
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/TrojanDropper.Agent.PMO
CynetMalicious (score: 100)
APEXMalicious
AvastWin32:Agent-AQRA [Trj]
ClamAVWin.Trojan.Agent-351851
KasperskyTrojan-Dropper.Win32.Agent.fqvk
BitDefenderTrojan.Encpk.Gen.1
NANO-AntivirusTrojan.Win32.Agent.dfazk
TencentTrojan-Dropper.Win32.Agent.hd
EmsisoftTrojan.Encpk.Gen.1 (B)
F-SecureTrojan.TR/Drop.Bots.A
DrWebTrojan.PWS.Vkontakte.origin
VIPRETrojan.Encpk.Gen.1
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.ec0e258487fa0a4d
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
JiangminBackdoor/IRCBot.let
AviraTR/Drop.Bots.A
MAXmalware (ai score=81)
Antiy-AVLTrojan[Dropper]/Win32.Aenjaris
Kingsoftmalware.kb.a.998
MicrosoftTrojanDropper:Win32/Aenjaris.CL!bit
XcitiumTrojWare.Win32.TrojanDropper.Aenjaris.C@7w0zum
ArcabitTrojan.Encpk.Gen.1
ZoneAlarmTrojan-Dropper.Win32.Agent.fqvk
GDataTrojan.Encpk.Gen.1
GoogleDetected
VBA32BScope.TrojanPSW.Vkontakte
ALYacTrojan.Encpk.Gen.1
Cylanceunsafe
RisingDropper.Agent!1.A494 (CLASSIC)
MaxSecureDropper.Agent.fqvk
FortinetW32/Generic.AC.32CECA!tr
BitDefenderThetaGen:NN.ZexaF.36802.5y1@auVe49mi
AVGWin32:Agent-AQRA [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove TrojanDropper:Win32/Aenjaris.CL!bit?

TrojanDropper:Win32/Aenjaris.CL!bit removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment