Categories: Trojan

Should I remove “Trojan:Win32/Phonzy.B!ml”?

The Trojan:Win32/Phonzy.B!ml is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Phonzy.B!ml virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Behavioural detection: Injection (inter-process)
  • Binary file triggered YARA rule
  • Touches a file containing cookies, possibly for information gathering
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Trojan:Win32/Phonzy.B!ml?


File Info:

name: B9EB2A46539E5B017B49.mlwpath: /opt/CAPEv2/storage/binaries/f9a85a57166a8612b627ca2b48d78ee89060b1d730f784673ad700117042bfbccrc32: 786C8D38md5: b9eb2a46539e5b017b4941ee8b618ee5sha1: 04f49f06f550e1340573dd2b80688e8d6daaa537sha256: f9a85a57166a8612b627ca2b48d78ee89060b1d730f784673ad700117042bfbcsha512: 745ce6652001aa88ebf2f507a2151def260ebf2d17eab0ecd74d0fe79616124185584d8f6c5c3319b2b940a47c56f8f1bc844904bc589a63e76fb204036d8398ssdeep: 24576:Ztb20pkaCqT5TBWgNjVYS0VB+Vf3oVGUG5y6zlTO3uXWVpA4yozB986Ao:qVg5tjVYSUAf3oVGUGkuXYAv5otype: PE32 executable (GUI) Intel 80386, for MS Windowstlsh: T148859D1227D88354E2BE837A697152015BF6BD52826AF25E3FDC24FD3F32351861A363sha3_384: 15ee968aa3599e27fe5b8e73892851f8312c9a916104fbfbeb8a1f88da5778cbc242d27c4a8db52f948261dae65fd998ep_bytes: e86ace0000e97ffeffffcccc57568b74timestamp: 2020-05-04 15:26:33

Version Info:

FileVersion: 2.11.2.0Comments: CHIP Secured InstallerFileDescription: CHIP Secured InstallerProductVersion: 2.11.2.0LegalCopyright: Copyright © 2020 Chip Digital GmbHCompanyName: CHIP Digital GmbHInternalName: CHIP Secured InstallerProductName: CHIP Secured InstallerOriginalFilename: CHIP Secured InstallerTranslation: 0x0407 0x04b0

Trojan:Win32/Phonzy.B!ml also known as:

Bkav W32.AIDetectMalware
Elastic malicious (high confidence)
ClamAV Win.Dropper.Miner-7086571-0
CAT-QuickHeal Downloader.AutoIT.Agent.A
Skyhigh BehavesLike.Win32.PUPXOV.th
Cylance unsafe
Sangfor Trojan.Win32.Save.a
CrowdStrike win/grayware_confidence_100% (W)
Symantec PUA.DownloadSponsor
tehtris Generic.Malware
ESET-NOD32 Win32/DownloadSponsor.C potentially unwanted
APEX Malicious
Cynet Malicious (score: 100)
Kaspersky not-a-virus:Downloader.MSIL.DownloadSponsor.ts
NANO-Antivirus Riskware.Script.Downware.evryrn
Rising Adware.DownloadSponsor!1.BE33 (CLASSIC)
Emsisoft Application.AdLoad (A)
DrWeb Adware.Covus.98
TrendMicro PUA.MSIL.DownloadSponsor.SMDR
Trapmine malicious.high.ml.score
FireEye Generic.mg.b9eb2a46539e5b01
Sophos Generic ML PUA (PUA)
SentinelOne Static AI – Malicious PE
Jiangmin Downloader.MSIL.ovv
Webroot W32.Adware.Gen
Google Detected
Antiy-AVL Trojan/Win32.SGeneric
Kingsoft malware.kb.a.993
Microsoft Trojan:Win32/Phonzy.B!ml
ZoneAlarm not-a-virus:Downloader.MSIL.DownloadSponsor.ts
Varist W32/DownloadSponsor.E.gen!Eldorado
AhnLab-V3 PUP/Win32.DownloadSponsor.C4114789
McAfee DLSponsor!au3
DeepInstinct MALICIOUS
VBA32 TScope.Trojan.MSIL
Malwarebytes Generic.Malware.AI.DDS
TrendMicro-HouseCall PUA.MSIL.DownloadSponsor.SMDR
Tencent Trojan.Msil.Downloadsponsor.xa
Yandex PUA.Downloader!r1HTqkpeo+E
Ikarus PUA.DownloadSponsor
MaxSecure Downloader.Agent.efha
Fortinet Riskware/DownloadSponsor

How to remove Trojan:Win32/Phonzy.B!ml?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

1 month ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

1 month ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

1 month ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

1 month ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

1 month ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

1 month ago