Trojan

Trojan:Win32/Phonzy.B!ml removal guide

Malware Removal

The Trojan:Win32/Phonzy.B!ml is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Phonzy.B!ml virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Behavioural detection: Injection (inter-process)
  • CAPE detected the NjRATGolden malware family
  • Binary file triggered YARA rule
  • Creates known Njrat/Bladabindi RAT registry keys
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Trojan:Win32/Phonzy.B!ml?


File Info:

name: EB32DF5B9FE58C109089.mlw
path: /opt/CAPEv2/storage/binaries/e9b5e263a0b569b3428ee39b1191b6af0cae9af75f77127c9f96b4d3ac9ff0a1
crc32: 4761AB22
md5: eb32df5b9fe58c109089561ca3ae61a7
sha1: f16de1b8cad37da56857b6d08a141eed6c5e7549
sha256: e9b5e263a0b569b3428ee39b1191b6af0cae9af75f77127c9f96b4d3ac9ff0a1
sha512: 95f0b68c38dcc721f90e7e0c5e8cab74d3a84992598bea2694d7140f94141f4fc6bf7603ec52311acda34e1d904cccb4465ecac99660a59bd1278b87a6afcabd
ssdeep: 24576:8u6J33O0c+JY5UZ+XC0kGsoTacbl6u2idWYI:mu0c++OCvkGsEacJ67bYI
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T176159D22B3DEC360CB669173BF69B3056EBF7C650630B85B2F980D79A950171162C7A3
sha3_384: fa6739454fa16c1ceb2464566b461946f67449776395cf7078a8f48aa4979a0de9561cdd9a00c3a3ca94c7213cff45ca
ep_bytes: e8b5d00000e97ffeffffcccccccccccc
timestamp: 2019-05-14 14:55:21

Version Info:

Translation: 0x0809 0x04b0

Trojan:Win32/Phonzy.B!ml also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.AutoIt.Agent.VQ
FireEyeGeneric.mg.eb32df5b9fe58c10
CAT-QuickHealTrojan.AutoIT.Injector.A
SkyhighBehavesLike.Win32.TrojanAitInject.ch
McAfeeTrojan-AitInject.aq
MalwarebytesGeneric.Malware.AI.DDS
VIPRETrojan.AutoIt.Agent.VQ
SangforVirus.Win32.Save.a
K7AntiVirusTrojan ( 0055dc781 )
K7GWTrojan ( 0055dc781 )
Cybereasonmalicious.b9fe58
SymantecAUT.Heuristic!gen5
tehtrisGeneric.Malware
ESET-NOD32Win32/Packed.Autoit.NBC suspicious
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.AutoIt.gen
BitDefenderTrojan.AutoIt.Agent.VQ
AvastAutoIt:Injector-JF [Trj]
TencentTrojan.Win32.Agent.hfw
EmsisoftTrojan.AutoIt.Agent.VQ (B)
F-SecureDropper.DR/AutoIt.Gen8
DrWebTrojan.AutoIt.426
TrendMicroTrojan.AutoIt.CRYPTINJECT.SMA
Trapminemalicious.high.ml.score
SophosTroj/AutoIt-CLG
IkarusTrojan.Win32.Autoit
VaristW32/AutoIt.QF.gen!Eldorado
AviraDR/AutoIt.Gen8
Antiy-AVLTrojan[Packed]/Win32.Autoit
MicrosoftTrojan:Win32/Phonzy.B!ml
ArcabitTrojan.AutoIt.Agent.VQ
GDataTrojan.AutoIt.Agent.VQ
GoogleDetected
AhnLab-V3Win-Trojan/AutoInj.Exp
BitDefenderThetaAI:Packer.39DE3CF819
ALYacTrojan.AutoIt.Agent.VQ
MAXmalware (ai score=85)
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallTrojan.AutoIt.CRYPTINJECT.SMA
RisingPUF.Pack-AutoIt!1.B8E7 (CLASSIC)
SentinelOneStatic AI – Malicious PE
FortinetAutoIt/Injector.ESJ!tr
AVGAutoIt:Injector-JF [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan:Win32/Phonzy.B!ml?

Trojan:Win32/Phonzy.B!ml removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment