Trojan

Trojan:Win32/Phonzy.C!ml removal tips

Malware Removal

The Trojan:Win32/Phonzy.C!ml is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Phonzy.C!ml virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Installs a browser addon or extension
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Behavioural detection: Transacted Hollowing
  • CAPE detected the shellcode patterns malware family
  • Deletes executed files from disk
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Trojan:Win32/Phonzy.C!ml?


File Info:

name: DF12611D7B1A90983D8E.mlw
path: /opt/CAPEv2/storage/binaries/c89389cd328d2a4a03230bca2ef9ea86789ad998df71fab995b58ca9cdabf475
crc32: FE7E8F94
md5: df12611d7b1a90983d8e987482085bd7
sha1: 5c1d1a2e4856ddea7e030cc0e2e4be6e2373fb5c
sha256: c89389cd328d2a4a03230bca2ef9ea86789ad998df71fab995b58ca9cdabf475
sha512: e2985c770ffe0b9995d731b7218d9e3bd96d15d26145eabbcfe3b96f247661f1c90cf9db064828d7ca91033aa9d9062766a24c658866a581c4b80237c1d5ad05
ssdeep: 12288:uaHc64b888888888888W88888888888DoscV7/9GqeMo3oM5omOX2n33rD+zG/oz:F86qjW7/9ooTrGnezG/aYFkJR30F6rpP
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1FCF40213B3C30071F5665A35CCB6C044AD2778B909F0605A2EF9EB4E4EBA6C69D77B21
sha3_384: ec39f728ff13bdeb28ab375ad6ad67b4eda672dd78de4b5c04851e0b41dc303028f232260091d56bd80c4f954dee09a7
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2018-06-14 13:27:46

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription:
FileVersion: 165.245
LegalCopyright:
ProductName:
ProductVersion: 165.245
Translation: 0x0000 0x04b0

Trojan:Win32/Phonzy.C!ml also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGeneric.Addrop.A.B4B71E40
ClamAVWin.Malware.Ejfb-9784212-0
SkyhighBehavesLike.Win32.Dropper.bc
McAfeeArtemis!DF12611D7B1A
VIPREGeneric.Addrop.A.B4B71E40
BitDefenderGeneric.Addrop.A.B4B71E40
Cybereasonmalicious.e4856d
ESET-NOD32a variant of Win32/TrojanDropper.Addrop.CH
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.MalCrack.a
AvastNSIS:Adware-AEQ [Adw]
RisingDownloader.TaskLoader/ARCHIVE!1.CDEA (CLASSIC)
EmsisoftGeneric.Addrop.A.B4B71E40 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen8
FireEyeGeneric.Addrop.A.B4B71E40
SophosML/PE-A
IkarusTrojan-Dropper.Addrop
JiangminTrojanDropper.Agentino.a
WebrootW32.Adware.Gen
AviraTR/Crypt.XPACK.Gen8
MicrosoftTrojan:Win32/Phonzy.C!ml
ZoneAlarmTrojan.Win32.MalCrack.a
GDataGeneric.Addrop.A.B4B71E40
VaristW32/Addrop.D.gen!Eldorado
AhnLab-V3Adware/Win.Addrop.C5573689
ALYacGeneric.Addrop.A.B4B71E40
MalwarebytesTrojan.Dropper
TencentTrojan.Win32.MalCrack.haw
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Addrop.CH!tr
AVGNSIS:Adware-AEQ [Adw]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan:Win32/Phonzy.C!ml?

Trojan:Win32/Phonzy.C!ml removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment