Spy Trojan

TrojanSpy:Win32/Swisyn.B removal tips

Malware Removal

The TrojanSpy:Win32/Swisyn.B is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What TrojanSpy:Win32/Swisyn.B virus can do?

  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Yara detections observed in process dumps, payloads or dropped files

How to determine TrojanSpy:Win32/Swisyn.B?


File Info:

name: 620A5C4914ECD8267528.mlw
path: /opt/CAPEv2/storage/binaries/d0012dfc537ce7869325923752287dd5f8ede92df5ea31c851afd3da851ecf9f
crc32: 498BFF3A
md5: 620a5c4914ecd82675287895428b102f
sha1: 268eb5ad6b486b2ed4dd7638bf105fae742b2b66
sha256: d0012dfc537ce7869325923752287dd5f8ede92df5ea31c851afd3da851ecf9f
sha512: ffe35342a974cd8e9bfcf02e9ea3b9fea1e60bad5222c85291fb9fb6a3c7dc3f08149be73b584771f30af8ad0ca9a8845d98602528897079c7cab7b61ec2adb0
ssdeep: 3072:4rqpvTM6+IfMRSJjKIOI0DTpF0DchdZ5uyr:4rqRMEfMRjfFTb0D8dZF
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T115D33B77F2C0C871E0620AB84C55E2E4652DFE303F2569AB75E94B0D5EBD5C269AC2C3
sha3_384: 04f3fc931bd537c09073abd511b440c39c2ff2c0c29a02ca4b93c020ee75dfff46ec335e70d28ad9db547f673affb98d
ep_bytes: 558becb9130000006a006a004975f953
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

TrojanSpy:Win32/Swisyn.B also known as:

LionicTrojan.Win32.Swisyn.4!c
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Doina.8841
ClamAVWin.Trojan.Swisyn-6290
FireEyeGeneric.mg.620a5c4914ecd826
SkyhighBehavesLike.Win32.Infected.ch
ALYacGen:Variant.Doina.8841
Cylanceunsafe
ZillyaTrojan.DelfInject.Win32.1323
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojanSpy:Win32/Swisyn.28544b54
K7GWSpyware ( 0010a1a91 )
K7AntiVirusTrojan ( 0010a1a91 )
ArcabitTrojan.Doina.D2289
BitDefenderThetaAI:Packer.E716AEB721
VirITTrojan.Win32.Generic.HEN
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32Win32/Spy.Swisyn.Q
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.DelfInject.vul
BitDefenderGen:Variant.Doina.8841
NANO-AntivirusTrojan.Win32.Swisyn.bajqm
AvastWin32:Evo-gen [Trj]
TencentMalware.Win32.Gencirc.10b11dbf
TACHYONTrojan/W32.DP-Swisyn.131072
EmsisoftGen:Variant.Doina.8841 (B)
F-SecureTrojan:W32/Swisyn.gen!B
DrWebTrojan.PWS.Stealer.223
VIPREGen:Variant.Doina.8841
TrendMicroTROJ_SWISYN.SMX
SophosTroj/PWS-BFZ
SentinelOneStatic AI – Malicious PE
JiangminTrojan/Swisyn.sq
WebrootSystem.Monitor.Hackhound
AviraTR/Agent.318979
Antiy-AVLTrojan/Win32.Swisyn
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.TrojanDownloader.Delf.gen@1xqow5
MicrosoftTrojanSpy:Win32/Swisyn.B
ViRobotTrojan.Win32.Swisyn.131584
ZoneAlarmTrojan.Win32.DelfInject.vul
GDataGen:Variant.Doina.8841
VaristW32/Trojan.IZZI-2159
AhnLab-V3Trojan/Win32.Antisb.R20537
McAfeeGeneric PWS.rz
MAXmalware (ai score=100)
VBA32Trojan.Swisyn
MalwarebytesTrojan.Swisyn
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_SWISYN.SMX
RisingTrojan.AntiVM!1.67DF (CLASSIC)
YandexTrojan.GenAsa!rlnRlo1lkcw
IkarusTrojan.Win32.Swisyn
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Swisyn.MRJ!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS

How to remove TrojanSpy:Win32/Swisyn.B?

TrojanSpy:Win32/Swisyn.B removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment