Trojan

Trojan:Win32/Phonzy.C!ml (file analysis)

Malware Removal

The Trojan:Win32/Phonzy.C!ml is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Phonzy.C!ml virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Installs a browser addon or extension
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Behavioural detection: Transacted Hollowing
  • Deletes executed files from disk

How to determine Trojan:Win32/Phonzy.C!ml?


File Info:

name: D9388EDB671FC4E722C0.mlw
path: /opt/CAPEv2/storage/binaries/af168f2a16841b981f7d2f9ae9764dbd088032a51a5fd329fca2973cb01f332c
crc32: E6595919
md5: d9388edb671fc4e722c021abe28d5ff5
sha1: 4723009a8eb59bc28cc0e54e5dd4d8006d2e948e
sha256: af168f2a16841b981f7d2f9ae9764dbd088032a51a5fd329fca2973cb01f332c
sha512: c6113df6955a1d657777f0c9b4dbdaa34e2b6c6827137b5acac80e94e3a9c78f4e7116d578a81a886baaec6487b03d0cdda3a34911ab5c900f91e114708e4ad1
ssdeep: 12288:uaHc64b888888888888W88888888888EoscV7/9GqeMo3SM5oxLTE33rD+zG/oBm:F86ljW7/9oSTlTKezG/aYFkJR30F6rpw
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1FCF40213B3C30032F5665A35CC768044AD2779B909F0605A2EF9EB4E4EB96C69D7BF21
sha3_384: d0974a1ccafb8c9843e4a88da88f1b5b8036b0a85a8688eb1a1310e95da87ec6a71580e568655ca7e479b5d2c2287150
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2018-06-14 13:27:46

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription:
FileVersion: 162.242
LegalCopyright:
ProductName:
ProductVersion: 162.242
Translation: 0x0000 0x04b0

Trojan:Win32/Phonzy.C!ml also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Addrop.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGeneric.Addrop.A.285106DD
ClamAVWin.Malware.Ejfb-9784212-0
FireEyeGeneric.Addrop.A.285106DD
SkyhighBehavesLike.Win32.Dropper.bc
McAfeeArtemis!D9388EDB671F
Cylanceunsafe
SangforTrojan.Win32.Addrop.Vtne
AlibabaTrojan:Win32/MalCrack.a57d411f
CrowdStrikewin/malicious_confidence_90% (D)
SymantecTrojan.Gen.MBT
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.MalCrack.a
BitDefenderGeneric.Addrop.A.285106DD
AvastNSIS:Adware-AEQ [Adw]
TencentTrojan.Win32.MalCrack.haw
EmsisoftGeneric.Addrop.A.285106DD (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen8
VIPREGeneric.Addrop.A.285106DD
SophosMal/Generic-S
IkarusTrojan-Dropper.Addrop
JiangminTrojanDropper.Agentino.a
AviraTR/Crypt.XPACK.Gen8
Kingsoftmalware.kb.a.987
MicrosoftTrojan:Win32/Phonzy.C!ml
ZoneAlarmTrojan.Win32.MalCrack.a
GDataGeneric.Addrop.A.285106DD
VaristW32/Addrop.D.gen!Eldorado
AhnLab-V3Adware/Win.Addrop.C5561178
ALYacGeneric.Addrop.A.285106DD
MalwarebytesTrojan.Dropper
RisingDownloader.TaskLoader/ARCHIVE!1.CDEA (CLASSIC)
YandexTrojan.MalCrack!pI63Fx/MZgc
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Addrop.CH!tr
AVGNSIS:Adware-AEQ [Adw]
Cybereasonmalicious.a8eb59
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Phonzy.C!ml?

Trojan:Win32/Phonzy.C!ml removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment