Trojan

Trojan:Win32/Infistov!pz information

Malware Removal

The Trojan:Win32/Infistov!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Infistov!pz virus can do?

  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Infistov!pz?


File Info:

name: F317B6BAFB5C6F4C3C9F.mlw
path: /opt/CAPEv2/storage/binaries/9e4763ddb6ac4377217c382cf6e61221efca0b0254074a3746ee03d3d421dabd
crc32: 5CC59C7D
md5: f317b6bafb5c6f4c3c9ffb967fd941b5
sha1: 509c2115bfbb20e65a08286935cfac1305894ede
sha256: 9e4763ddb6ac4377217c382cf6e61221efca0b0254074a3746ee03d3d421dabd
sha512: 240ac29961cd212efda1ad2a4bf7b93bd0d2256d378f6a54f132866e7796f8abccd21b3cf2bdcbf2e6741157468519f540a900880e965e9f4bb8a67ab310e16c
ssdeep: 49152:6gUgbYXwB3FHjD5JPz1MbEUl8VlvfxA7vW/LL4Niv:6sYk5JPpYEkMAzWz8iv
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T17075DF1176D6C537C06701702E2ADBBA9139BD700B32C5EBA3D81E2F6E716C16672F92
sha3_384: debdebad0d43566a14372bd439077bcb6ab42e5840d167af98c2b9e8658321d937c9f80556b390ca37d58d431b9dbee9
ep_bytes: e8dd020000e974feffff836104008bc1
timestamp: 2021-11-21 20:28:09

Version Info:

0: [No Data]

Trojan:Win32/Infistov!pz also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Agent.Y!c
DrWebExploit.CVE-2021-41379.1
MicroWorld-eScanTrojan.GenericKD.38451701
FireEyeGeneric.mg.f317b6bafb5c6f4c
SkyhighBehavesLike.Win32.Generic.tc
McAfeeExploit-GEJ!F317B6BAFB5C
Cylanceunsafe
ZillyaExploit.CVE202141379.Win32.1
SangforExploit.Win32.CVE.Vzgi
K7AntiVirusExploit ( 0058ad0b1 )
AlibabaExploit:Win32/CVE-2021-41379.1042
K7GWExploit ( 0058ad0b1 )
ArcabitTrojan.Generic.D24AB9F5
SymantecRansom.Conti!gen12
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Exploit.CVE-2021-41379.A
CynetMalicious (score: 99)
APEXMalicious
ClamAVWin.Exploit.CVE_2021_41379-9911901-0
KasperskyHEUR:Exploit.OLE2.Agent.gen
BitDefenderTrojan.GenericKD.38451701
SUPERAntiSpywarePUP.Exploit/Variant
AvastOther:Malware-gen [Trj]
TencentMalware.Win32.Gencirc.10bc16a1
SophosExp/2143883-A
F-SecureExploit:W32/CVE-2021-41379.A
VIPRETrojan.GenericKD.38451701
TrendMicroHackTool.Win32.CVE202141379.A
Trapminemalicious.moderate.ml.score
EmsisoftTrojan.GenericKD.38451701 (B)
SentinelOneStatic AI – Suspicious PE
JiangminExploit.OLE2.a
WebrootW32.Trojan.Gen
VaristW32/CVE2141379.A.gen!Eldorado
AviraHEUR/AGEN.1315699
Antiy-AVLTrojan/Win32.Generic
XcitiumMalware@#2ym6ndauh4ltd
MicrosoftTrojan:Win32/Infistov!pz
ZoneAlarmHEUR:Exploit.OLE2.Agent.gen
GDataWin32.Exploit.CVE-2021-41379.B
GoogleDetected
AhnLab-V3Trojan/Win.Generic.R452959
ALYacExploit.CVE-2021-41379
MAXmalware (ai score=94)
MalwarebytesExploit.Agent.Generic
PandaPUP/Hacktool
TrendMicro-HouseCallHackTool.Win32.CVE202141379.A
RisingExploit.CVE-2021-41379!1.DABC (CLASSIC)
YandexExploit.CVE-2021-41379!jZzAhwTY/Sk
IkarusExploit.CVE-2021-41379
MaxSecureTrojan.Malware.208224046.susgen
FortinetW32/CVE_2021_41379.A!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan:Win32/Infistov!pz?

Trojan:Win32/Infistov!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment