Categories: Trojan

Trojan:Win32/Phonzy.A!ml removal tips

The Trojan:Win32/Phonzy.A!ml is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Phonzy.A!ml virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • The executable is likely packed with VMProtect
  • Authenticode signature is invalid
  • Checks for the presence of known devices from debuggers and forensic tools
  • Checks for the presence of known devices from debuggers and forensic tools
  • Attempts to modify browser security settings
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Phonzy.A!ml?


File Info:

name: 241BD5913BF7C1A3A45B.mlwpath: /opt/CAPEv2/storage/binaries/1983d55c97b80a69e1961b99661c1035c2a75d600f2c6ed9eb92a926cf02c8abcrc32: 9AD5991Fmd5: 241bd5913bf7c1a3a45b79393884673asha1: d28710d95229401c2bd9026be21516676025bb50sha256: 1983d55c97b80a69e1961b99661c1035c2a75d600f2c6ed9eb92a926cf02c8absha512: c5a932378ff0169bfa30819df54a2c876f398849602f1df8ad346a45ece8e767e6b09f1f0fab672f599b1c069e5534161bf18370970cb62159df70f1a86e5425ssdeep: 24576:e19k85F4OCrZOvgztUYBMPFeO/1W6blr4HxSorKrSYhVlvOe/8dXF9J66vsAG:1pOInO/1W6bZGSorKWYhVlvOpDGtype: PE32 executable (GUI) Intel 80386, for MS Windowstlsh: T121C59D11E29643ABC5472131357E673BA2BDEE7547349BA3B790FE293932093642123Fsha3_384: f584ae9c52fc089eee8715fc2d68c41f512b18ef0a5a6fdd79b832d9abf41fe2a8286a0589eae5925814480f4c3dc4c9ep_bytes: 558bec6aff6848c6570068bc76520064timestamp: 2016-09-06 09:44:41

Version Info:

Comments: 全中文全可视化编程语言CompanyName: 大有吴涛易语言软件公司FileDescription: 易语言FileVersion: 5, 6, 0, 0InternalName: 易LegalCopyright: 版权所有(C) 2000-2016LegalTrademarks: OriginalFilename: E.EXEPrivateBuild: ProductName: 易语言ProductVersion: 5, 6, 0, 0SpecialBuild: Translation: 0x0804 0x04b0

Trojan:Win32/Phonzy.A!ml also known as:

Bkav W32.AIDetectMalware
Lionic Trojan.Win32.VMProtect.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.Generic.18152235
Skyhigh BehavesLike.Win32.Generic.vh
McAfee GenericRXBP-YX!241BD5913BF7
Cylance unsafe
Zillya Trojan.Packed.Win32.90100
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Packed:Win32/VMProtect.32441a2f
K7GW Trojan ( 7000001c1 )
K7AntiVirus Trojan ( 7000001c1 )
Arcabit Trojan.Generic.D114FB2B
BitDefenderTheta Gen:NN.ZexaF.36680.Gw1@aKoyyGpb
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Packed.VMProtect.AAA
APEX Malicious
ClamAV Win.Malware.Flystudio-6937682-0
BitDefender Trojan.Generic.18152235
NANO-Antivirus Trojan.Win32.Agent.elcawz
Avast FileRepMalware [Trj]
Sophos Mal/Generic-S
VIPRE Trojan.Generic.18152235
Emsisoft Trojan.Generic.18152235 (B)
Ikarus Trojan.Win32.VMProtect
Microsoft Trojan:Win32/Phonzy.A!ml
GData Trojan.Generic.18152235
VBA32 Trojan.Dynamer
ALYac Trojan.Generic.18152235
Malwarebytes Generic.Malware/Suspicious
Panda Trj/CI.A
Rising Trojan.Dynamer!8.3A0 (RDMK:cmRtazpdJ4+ZZCzCPg1DoRgvK0bU)
Yandex Trojan.GenAsa!sxCtsn0f5hs
SentinelOne Static AI – Malicious PE
Fortinet W32/GenericRXBP.YX!tr
AVG FileRepMalware [Trj]
Cybereason malicious.952294
DeepInstinct MALICIOUS

How to remove Trojan:Win32/Phonzy.A!ml?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 months ago