Trojan

Trojan:Win32/Skeeyah.B!rfn removal guide

Malware Removal

The Trojan:Win32/Skeeyah.B!rfn is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Skeeyah.B!rfn virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Mimics the system’s user agent string for its own requests
  • A process attempted to delay the analysis task.
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Deletes its original binary from disk
  • Attempts to remove evidence of file being downloaded from the Internet
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Trojan:Win32/Skeeyah.B!rfn?


File Info:

crc32: 0B93E3F7
md5: 601ecb5eb8711ef33343039c10537b90
name: o2jjg443EnttF.exe
sha1: 877977120475da3eca9251f9023a0996139af054
sha256: 0d97f48a900d1351bcbaae738099ca1474bec8aceeac48fce672df54e5c1de55
sha512: 21cda4c8cc3582dfa1467b39762ae9879cf1c5ce6260b493208c6f22a5473aae85094ab9f673987f9144c524322a56d0076dfffbb2f2b9e058be6f97f6ab4273
ssdeep: 12288:PbFmNHloUQYbEZpakjYDJA1zpYDwUei8jPjMQ:gHNQYbuDj6SfLjPb
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: x7248x6743x6240x6709 (C) 2002
InternalName: Visual Editor
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: Visual Editor x5e94x7528x7a0bx5e8f
ProductVersion: 1, 0, 0, 1
FileDescription: Visual Editor x57fax7840x7c7bx5e94x7528x7a0bx5e8f
OriginalFilename: Visual Editor.EXE
Translation: 0x0804 0x04b0

Trojan:Win32/Skeeyah.B!rfn also known as:

DrWebTrojan.DownLoader30.46532
MicroWorld-eScanTrojan.Autoruns.GenericKDS.42074815
McAfeeRDN/Emotet
MalwarebytesTrojan.Emotet
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderTrojan.Autoruns.GenericKDS.42074815
K7GWRiskware ( 0040eff71 )
CrowdStrikewin/malicious_confidence_70% (W)
BitDefenderThetaGen:NN.ZexaE.32515.Iq1@aaBNJfeb
SymantecTrojan Horse
APEXMalicious
ClamAVWin.Trojan.Generic-7419910-0
GDataTrojan.Autoruns.GenericKDS.42074815
KasperskyUDS:DangerousObject.Multi.Generic
Endgamemalicious (high confidence)
F-SecureTrojan.TR/AD.Emotet.pmmmu
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionArtemis!Trojan
Trapminesuspicious.low.ml.score
WebrootW32.Trojan.Emotet
AviraTR/AD.Emotet.pmmmu
ArcabitTrojan.Autoruns.GenericS.D28202BF
ZoneAlarmUDS:DangerousObject.Multi.Generic
MicrosoftTrojan:Win32/Skeeyah.B!rfn
AhnLab-V3Trojan/Win32.RL_Trickbot.R301608
ALYacTrojan.Autoruns.GenericKDS.42074815
MAXmalware (ai score=83)
CylanceUnsafe
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/GenKryptik.DYXT
SentinelOneDFI – Suspicious PE
FortinetW32/GenKryptik.DYLZ!tr
Ad-AwareTrojan.Autoruns.GenericKDS.42074815
AVGFileRepMalware
Paloaltogeneric.ml

How to remove Trojan:Win32/Skeeyah.B!rfn?

Trojan:Win32/Skeeyah.B!rfn removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment