Trojan

How to remove “Trojan:Win32/Lethic.I”?

Malware Removal

The Trojan:Win32/Lethic.I is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Lethic.I virus can do?

  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Compression (or decompression)
  • Injection with CreateRemoteThread in a remote process
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Expresses interest in specific running processes
  • A process created a hidden window
  • Unconventionial language used in binary resources: Arabic (Oman)
  • Code injection with CreateRemoteThread in a remote process
  • Executed a process and injected code into it, probably while unpacking
  • Installs itself for autorun at Windows startup
  • Network activity detected but not expressed in API logs
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Trojan:Win32/Lethic.I?


File Info:

crc32: 46D881CE
md5: 2cda56f9d2d6e2993325611e6aa05567
name: 2CDA56F9D2D6E2993325611E6AA05567.mlw
sha1: 644768eafc8926b9572a9189dfcf6e6dfcd206e3
sha256: 15b2e870465654fec2035e78e48b15fb449a39bc5ddeadb6cf9dab7dbd69f4a1
sha512: 46d0d453e7bf6b1003acc50891a7677c0789828755e5bcfacf850fb257bc436a2849c7813ea4d2e55954d656960ec810769e35b7a85428bca8c4dfb91fca683c
ssdeep: 24576:i+/Vsn8cYpZV4L4K4f4b4Y4n474h444dcWi99maId2YFAm:iuV+PYDe8Dws54M6ZP
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan:Win32/Lethic.I also known as:

BkavW32.Common.A02D12C8
Elasticmalicious (high confidence)
ClamAVWin.Packed.Zusy-7039568-1
FireEyeGeneric.mg.2cda56f9d2d6e299
Qihoo-360Win32/Trojan.7eb
McAfeeTrojan-FMLV!2CDA56F9D2D6
CylanceUnsafe
ZillyaTrojan.Waldek.Win32.5224
SangforMalware
K7AntiVirusTrojan ( 0050cc221 )
BitDefenderGen:Variant.Mikey.117444
K7GWTrojan ( 0050cc221 )
Cybereasonmalicious.9d2d6e
BitDefenderThetaAI:Packer.28C3539F1F
CyrenW32/S-bec68aff!Eldorado
SymantecTrojan.Gen
APEXMalicious
AvastWin32:Trojan-gen
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
NANO-AntivirusTrojan.Win32.Waldek.enyzes
ViRobotTrojan.Win32.XPacker.Gen
MicroWorld-eScanGen:Variant.Mikey.117444
RisingTrojan.Kryptik!1.AA6F (CLASSIC)
Ad-AwareGen:Variant.Mikey.117444
SophosMal/Generic-S
ComodoBackdoor.Win32.Androm.AXQ@6yqacl
F-SecureHeuristic.HEUR/AGEN.1103331
DrWebTrojan.Inject2.47906
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_LETHIC.SMT
McAfee-GW-EditionBehavesLike.Win32.Trojan.th
EmsisoftGen:Variant.Mikey.117444 (B)
IkarusTrojan.Win32.Qadars
JiangminTrojan.Waldek.ezp
AviraHEUR/AGEN.1103331
MAXmalware (ai score=82)
Antiy-AVLTrojan/Win32.TSGeneric
MicrosoftTrojan:Win32/Lethic.I
ArcabitTrojan.Mikey.D1CAC4
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Mikey.117444
AhnLab-V3Trojan/Win32.Scarsi.R199259
Acronissuspicious
VBA32BScope.Trojan.Inject
ALYacGen:Variant.Mikey.117444
MalwarebytesTrojan.Injector
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Kryptik.FSJS
TrendMicro-HouseCallTROJ_LETHIC.SMT
TencentMalware.Win32.Gencirc.10b343a3
YandexTrojan.GenAsa!f9sLCgEBBqE
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_98%
FortinetW32/GenKryptik.ADEL!tr
AVGWin32:Trojan-gen
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan:Win32/Lethic.I?

Trojan:Win32/Lethic.I removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment