Trojan

Trojan:Win32/Ammyrat.C removal instruction

Malware Removal

The Trojan:Win32/Ammyrat.C is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Ammyrat.C virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Guard pages use detected – possible anti-debugging.
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Trojan:Win32/Ammyrat.C?


File Info:

name: DA43735329719618C2E8.mlw
path: /opt/CAPEv2/storage/binaries/566c451fae898022ae427dfcd91988bc90fe916319755a119b8364083dc32452
crc32: B5769911
md5: da43735329719618c2e8917d415588bb
sha1: 8f8c4bada03f0fc65ad584ebde06080b08624c24
sha256: 566c451fae898022ae427dfcd91988bc90fe916319755a119b8364083dc32452
sha512: 8cacc7086e74624f35dd15448b3544174d723522ead9562526616cb0aee8b59931f50ee57e59bae2cfe06931520cc9590f895ef3d4da346342ce9a382df733d6
ssdeep: 12288:ytZEZm6sUA+v1bJ0m1/KJO3W2zDE8KANd3UeypiD57j3IQelk8aNiLXfsvlc051X:y/E8UA+9J0T2zDE8mppgktLXwD51Ci3D
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T15CE49D247A42C036D5B200714ABDAABB657DB9750B6609CBE3C40A3D0D746E23F35B7B
sha3_384: 9a3c1c28d329c738baad2b6684849a07dab4a1ab6bfe2d2bded601bd289bbf373d5d0b8c93d07a69bd4c629c7cbca55b
ep_bytes: e8700b0000e98efeffff558bec6a00ff
timestamp: 2018-06-11 19:22:41

Version Info:

CompanyName: SynapticosSoft, Corporation.
FileDescription: zivLFKKY
FileVersion: 9,13,3,24
LegalCopyright: Copyright 1996 - 2001
OriginalFilename: DBhFVevZa.exe
ProductVersion: 9,13,3,24
ProductName: reiRypV
Translation: 0x0409 0x04e7

Trojan:Win32/Ammyrat.C also known as:

MicroWorld-eScanGen:Variant.Ransom.LockerGoga.1
ALYacGen:Variant.Ransom.LockerGoga.1
CylanceUnsafe
VIPREGen:Variant.Ransom.LockerGoga.1
Cybereasonmalicious.329719
SymantecRemacc.Ammyy
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/RA-based.NHK
APEXMalicious
ClamAVWin.Trojan.Mikey-9958102-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Ransom.LockerGoga.1
NANO-AntivirusTrojan.Win32.RAbased.feemye
Ad-AwareGen:Variant.Ransom.LockerGoga.1
ComodoTrojWare.Win32.Ammyrat.C@8cr9ar
ZillyaBackdoor.RA.Win32.387
TrendMicroBackdoor.Win32.FLAWEDAMMY.SMA
Trapminesuspicious.low.ml.score
FireEyeGeneric.mg.da43735329719618
EmsisoftGen:Variant.Ransom.LockerGoga.1 (B)
GDataGen:Variant.Ransom.LockerGoga.1
JiangminBackdoor.RA-Based.ad
AviraTR/AD.AmmyyRAT.qvknn
MAXmalware (ai score=80)
ArcabitTrojan.Ransom.LockerGoga.1
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftTrojan:Win32/Ammyrat.C
CynetMalicious (score: 99)
AhnLab-V3Trojan/Win32.Agent.R231927
VBA32Backdoor.RAbased
MalwarebytesMalware.AI.736808814
TrendMicro-HouseCallBackdoor.Win32.FLAWEDAMMY.SMA
RisingBackdoor.FlawedAmmyy!1.B6B0 (CLASSIC)
IkarusBackdoor.Rat.FlawedAmmyy
BitDefenderThetaGen:NN.ZexaF.34806.PC2@a8OJv3gi

How to remove Trojan:Win32/Ammyrat.C?

Trojan:Win32/Ammyrat.C removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment