Trojan

Trojan:Win32/Phonzy.A!ml (file analysis)

Malware Removal

The Trojan:Win32/Phonzy.A!ml is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Phonzy.A!ml virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Installs a browser addon or extension
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Behavioural detection: Transacted Hollowing
  • CAPE detected the shellcode patterns malware family
  • Deletes executed files from disk
  • Uses suspicious command line tools or Windows utilities
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Trojan:Win32/Phonzy.A!ml?


File Info:

name: 819F4AE7A9AE4659F457.mlw
path: /opt/CAPEv2/storage/binaries/7298761f20459ea987b5f6d9d149b12f81749bb506bc6b0ca71258457074f3da
crc32: A39437EC
md5: 819f4ae7a9ae4659f457e64c02fb22de
sha1: 6e101cba9a08b53bb06945f84cd6fded54cfae97
sha256: 7298761f20459ea987b5f6d9d149b12f81749bb506bc6b0ca71258457074f3da
sha512: bd9d65399747af5f4089f69610157930af368cccc3e44438b904fcdc6befd1959ca201c9f7619fff22d6c81fd58f905ee988e51b1894ad7e413049805447ec54
ssdeep: 12288:uaHc64b888888888888W88888888888DoscV7/9GqeMo3oM5omOX2n33rD+zG/ow:F86qjW7/9ooTrGnezG/aYFkJR30F6rpM
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1ADF40213B3C30071F5665A35CCB6C044AD2778B909F0605A2EF9EB4E4EBA6C69D77B21
sha3_384: f6c4dc601a9fefe80a0fe9d191e24000d012fc7b9bca7f3f5e23b4eced9d7ba831f7532670789e1002d1be464d40b2ec
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2018-06-14 13:27:46

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription:
FileVersion: 165.245
LegalCopyright:
ProductName:
ProductVersion: 165.245
Translation: 0x0000 0x04b0

Trojan:Win32/Phonzy.A!ml also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGeneric.Addrop.A.B4B71E40
SkyhighBehavesLike.Win32.Dropper.bc
VIPREGeneric.Addrop.A.B4B71E40
Cybereasonmalicious.a9a08b
ESET-NOD32a variant of Win32/TrojanDropper.Addrop.CH
APEXMalicious
ClamAVWin.Malware.Ejfb-9784212-0
KasperskyTrojan.Win32.MalCrack.a
BitDefenderGeneric.Addrop.A.B4B71E40
SUPERAntiSpywareTrojan.Agent/Gen-Dropper
AvastNSIS:Adware-AEQ [Adw]
TencentTrojan.Win32.MalCrack.haw
EmsisoftGeneric.Addrop.A.B4B71E40 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen8
FireEyeGeneric.Addrop.A.B4B71E40
SophosML/PE-A
IkarusTrojan-Dropper.Addrop
JiangminTrojanDropper.Agentino.a
WebrootW32.Adware.Gen
AviraTR/Crypt.XPACK.Gen8
VaristW32/Addrop.D.gen!Eldorado
MicrosoftTrojan:Win32/Phonzy.A!ml
ZoneAlarmTrojan.Win32.MalCrack.a
GDataGeneric.Addrop.A.B4B71E40
CynetMalicious (score: 100)
AhnLab-V3Adware/Win.Addrop.C5573689
ALYacGeneric.Addrop.A.B4B71E40
MalwarebytesTrojan.Dropper
RisingDownloader.TaskLoader/ARCHIVE!1.CDEA (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Addrop.CH!tr
AVGNSIS:Adware-AEQ [Adw]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan:Win32/Phonzy.A!ml?

Trojan:Win32/Phonzy.A!ml removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment