Trojan

Trojan:Win32/Phonzy.B!ml removal guide

Malware Removal

The Trojan:Win32/Phonzy.B!ml is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Phonzy.B!ml virus can do?

  • Performs HTTP requests potentially not found in PCAP.
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Phonzy.B!ml?


File Info:

name: 978C1D2E2A3B688C8166.mlw
path: /opt/CAPEv2/storage/binaries/9a05b83829099ed1f7e34edb8ff4745bbaabb255e4f506e26191a8352b8f3407
crc32: 0C395ED5
md5: 978c1d2e2a3b688c81665d17c76fd82a
sha1: 0a4b8e921843c5417a3ee31ee58752ab96e0a981
sha256: 9a05b83829099ed1f7e34edb8ff4745bbaabb255e4f506e26191a8352b8f3407
sha512: fa2be4212b36ccf4ddeaf2d1709ee0012606bcf402d0bd508a0c6f7a11fb9e73443d32fd0477fe7fc3c67aa155bb7f9b12ab97e91b0656138bacbd266f35726c
ssdeep: 24576:JmgpY9kOrtis8p5kZwg2TZaqdiXSp0c02uFG6dAk3CMLVvk:JZGk/Tkeg2TZaqdwk0c05HGips
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14965E012F68280F7CE49163004AB2776BA74DB564B258FC753A4DD7C2D32761AE3723A
sha3_384: a90835560cc0c1b3c109fa92127ffc12cace7e72b388a1bd8e93a8820ba15fcd579ecf191117cb09b715332969d843c2
ep_bytes: 558bec6aff68982655006834fc450064
timestamp: 2013-04-05 05:51:37

Version Info:

FileVersion: 1.2.3.0
FileDescription: 卡枪软件
ProductName: 卡枪软件
ProductVersion: 1.2.3.0
CompanyName: QQ228843415
LegalCopyright: QQ228843415 版权所有
Comments: 卡枪软件
Translation: 0x0804 0x04b0

Trojan:Win32/Phonzy.B!ml also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Zusy.446560
FireEyeGeneric.mg.978c1d2e2a3b688c
SkyhighBehavesLike.Win32.Generic.tc
ALYacGen:Variant.Zusy.446560
MalwarebytesGeneric.Malware.AI.DDS
VIPREGen:Variant.Zusy.446560
CrowdStrikewin/malicious_confidence_60% (D)
K7GWTrojan ( 005246d51 )
K7AntiVirusTrojan ( 005246d51 )
ArcabitTrojan.Zusy.D6D060
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/PSW.QQPass.OSF
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Trojan.Flystudio-9943951-0
BitDefenderGen:Variant.Zusy.446560
AvastWin32:TrojanX-gen [Trj]
TencentTrojan.Win32.QQPass.w
EmsisoftGen:Variant.Zusy.446560 (B)
F-SecureTrojan:W32/DelfInject.R
ZillyaTrojan.QQPass.Win32.63591
Trapminesuspicious.low.ml.score
SophosGeneric ML PUA (PUA)
SentinelOneStatic AI – Malicious PE
VaristW32/S-47c1ea66!Eldorado
AviraTR/PSW.QQpass.kgzug
MAXmalware (ai score=82)
Antiy-AVLTrojan/Win32.FlyStudio.a
XcitiumWorm.Win32.Dropper.RA@1qraug
MicrosoftTrojan:Win32/Phonzy.B!ml
GDataWin32.Trojan.PSE.19WW9IN
GoogleDetected
McAfeeGenericRXAC-WL!978C1D2E2A3B
Cylanceunsafe
RisingMalware.Undefined!8.C (TFE:5:Fhgu1aNL0l)
YandexTrojan.GenAsa!agb7R1zg4yg
IkarusVirus.Win32.Sality
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/CoinMiner.PHP!tr
BitDefenderThetaGen:NN.ZexaF.36792.Er0@aGabngcb
AVGWin32:TrojanX-gen [Trj]
Cybereasonmalicious.21843c
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Phonzy.B!ml?

Trojan:Win32/Phonzy.B!ml removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment