Trojan

What is “Trojan:Win32/Phonzy.B!ml”?

Malware Removal

The Trojan:Win32/Phonzy.B!ml is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Phonzy.B!ml virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Anomalous binary characteristics
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Phonzy.B!ml?


File Info:

name: D9ECA76D79CD37606C02.mlw
path: /opt/CAPEv2/storage/binaries/9fa5ad4f184a1ca1af69275adfad2e56641f366cd6bde7b8e40f9b17f95bf0cc
crc32: 49AA92D9
md5: d9eca76d79cd37606c027f035af58901
sha1: 416c688e1acecd894292d929937cb6d2cb709af9
sha256: 9fa5ad4f184a1ca1af69275adfad2e56641f366cd6bde7b8e40f9b17f95bf0cc
sha512: f3ecf2f94fd0d5f07f9211983fcb888e39ebd78a955011aeeb9da1ee357b31bbd12315412a78110aba39c7d9d5987bd6efb6075ee49fee0f52fc4c1529170993
ssdeep: 24576:8kj+W75YAKEF+tS5ArDZRUgYLatuCSQf:h77GAK/tlRtYLat
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T190559C1067F81119F2B36BB2AFFAD9668A77BDB64A36D11F2214420F0931E40D971B37
sha3_384: f597fc28e37efb5db43dfd638f4ce96575b91013fc941368bb8d496c3d150d391a729ff748f01a325fcde0d7005d3cd2
ep_bytes: 558bec81ec1402000056578dbdecfdff
timestamp: 2021-02-15 03:01:38

Version Info:

Comments: Acrobat Installer Utility
CompanyName: Adobe Systems, Inc.
FileDescription: ADelRCP Dynamic Link Library
FileVersion: 21.1.20138.422477
InternalName: ADelRCP
LegalCopyright: Copyright © 1998-2011 Adobe Systems Incorporated and its licensors. All rights reserved.
OriginalFilename: ADelRCP.dll
ProductName: ADelRCP Dynamic Link Library
ProductVersion: 21.1.20138.422477
Translation: 0x0409 0x04b0

Trojan:Win32/Phonzy.B!ml also known as:

BkavW32.AIDetectMalware
DrWebWin32.Expiro.153
MicroWorld-eScanWin32.Expiro.Gen.7
CAT-QuickHealW32.Expiro.R3
SkyhighBehavesLike.Win32.Generic.tm
ALYacWin32.Expiro.Gen.7
Cylanceunsafe
VIPREWin32.Expiro.Gen.7
SangforTrojan.Win32.Save.a
K7AntiVirusVirus ( 005a8b911 )
K7GWVirus ( 005a8b911 )
SymantecW32.Xpiro.J!dam
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Expiro.NDP
CynetMalicious (score: 100)
APEXMalicious
KasperskyVirus.Win32.Moiva.a
BitDefenderWin32.Expiro.Gen.7
NANO-AntivirusVirus.Win32.Virut-Gen.bwpxnc
AvastWin32:FileInfector-C [Heur]
TencentVirus.Win32.VirMoiva.a
TACHYONVirus/W32.Movia
EmsisoftWin32.Expiro.Gen.7 (B)
F-SecureMalware.W32/Infector.Gen
TrendMicroVirus.Win32.EXPIRO.JMA
FireEyeGeneric.mg.d9eca76d79cd3760
SophosW32/Moiva-A
IkarusVirus.Win32.Expiro
GDataWin32.Expiro.Gen.7
JiangminTrojan.Generic.hndfx
VaristW32/Expiro.AU.gen!Eldorado
AviraW32/Infector.Gen
Antiy-AVLVirus/Win32.Expiro.x
Kingsoftmalware.kb.a.880
ArcabitWin32.Expiro.Gen.7
ZoneAlarmVirus.Win32.Moiva.a
MicrosoftTrojan:Win32/Phonzy.B!ml
GoogleDetected
MAXmalware (ai score=84)
VBA32Trojan.Sabsik.TE
MalwarebytesVirus.M0yv
PandaW32/Moyv.A
RisingTrojan.Generic@AI.92 (RDML:4vgIU+qLwubIQbnijOwp7w)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Expiro.NDP!tr
AVGWin32:FileInfector-C [Heur]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan:Win32/Phonzy.B!ml?

Trojan:Win32/Phonzy.B!ml removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment