Spy Trojan

TrojanSpy:Win32/Clitor.A!rfn information

Malware Removal

The TrojanSpy:Win32/Clitor.A!rfn is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What TrojanSpy:Win32/Clitor.A!rfn virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Attempts to connect to a dead IP:Port (2 unique times)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Deletes its original binary from disk
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

llwyncelyncaravanpark.co.uk

How to determine TrojanSpy:Win32/Clitor.A!rfn?


File Info:

crc32: D6260046
md5: e7e8c51fe05e9076a1328cda2f180da2
name: E7E8C51FE05E9076A1328CDA2F180DA2.mlw
sha1: b01f8283b05150f95bcdcc38593d407ca0a486ba
sha256: cd8aa56ee0d472cb6ffb765acb1ddeed8a136ae2c97d84a4041ca4efb6e253d4
sha512: 4e10e6c7073bcbbd8a3d562c64dabede3c9a1719cd639782942978f08f84ce33fca8c3be317591e58901d8a79df36f0015d98eaefd7ca0e846c097041bdbf338
ssdeep: 24576:cfP261K2KdJ9wbOGOogMnDe2ouscEqf7eM1:gbw2aJ9n/MDe2ouv3L
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

TrojanSpy:Win32/Clitor.A!rfn also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 005164e71 )
LionicTrojan.Win32.Jimmy.7!c
Elasticmalicious (high confidence)
DrWebTrojan.VbCrypt.250
CynetMalicious (score: 100)
CAT-QuickHealTrojan.Chapak.ZZ6
ALYacTrojan.BRMon.Gen.1
CylanceUnsafe
SangforSuspicious.Win32.Save.a
CrowdStrikewin/malicious_confidence_80% (D)
K7GWTrojan ( 005164e71 )
Cybereasonmalicious.fe05e9
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.FWHS
APEXMalicious
AvastWin32:Malware-gen
KasperskyTrojan-Banker.Win32.Jimmy.ur
BitDefenderTrojan.BRMon.Gen.1
NANO-AntivirusTrojan.Win32.AD.esnhoc
MicroWorld-eScanTrojan.BRMon.Gen.1
TencentMalware.Win32.Gencirc.10bafa14
Ad-AwareTrojan.BRMon.Gen.1
SophosMal/Generic-S
ComodoTrojWare.Win32.Bulta.GG@781ute
BitDefenderThetaGen:NN.ZexaF.34126.2qW@a4WlXee
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_HPGANDCRAB.SMONT
McAfee-GW-EditionBehavesLike.Win32.Generic.cc
FireEyeGeneric.mg.e7e8c51fe05e9076
EmsisoftTrojan.BRMon.Gen.1 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Scarsi.aum
AviraHEUR/AGEN.1103381
Antiy-AVLTrojan/Generic.ASMalwS.241DE06
KingsoftWin32.Troj.Banker.(kcloud)
MicrosoftTrojanSpy:Win32/Clitor.A!rfn
GDataTrojan.BRMon.Gen.1
TACHYONTrojan/W32.Scarsi.899584.B
Acronissuspicious
McAfeeGenericRXCX-SD!E7E8C51FE05E
MAXmalware (ai score=99)
MalwarebytesMalware.AI.4113045810
PandaTrj/RnkBend.A
TrendMicro-HouseCallRansom_HPGANDCRAB.SMONT
RisingMalware.Obscure/Heur!1.A89E (CLASSIC)
YandexTrojan.GenAsa!TcDwVoLhUn4
IkarusTrojan.Win32.Crypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.FWHS!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove TrojanSpy:Win32/Clitor.A!rfn?

TrojanSpy:Win32/Clitor.A!rfn removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment