Trojan

About “Trojan:Win32/Upatre!pz” infection

Malware Removal

The Trojan:Win32/Upatre!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Upatre!pz virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Upatre!pz?


File Info:

name: 7418AFDA17E89E60678A.mlw
path: /opt/CAPEv2/storage/binaries/f8d53e944aed055579b66e6cbfc3b65501ed8d7758ae490354b7f39d52047d08
crc32: 83C59233
md5: 7418afda17e89e60678af59caa305571
sha1: a0412ca7cafd701d292d576c5753a491872a9dc3
sha256: f8d53e944aed055579b66e6cbfc3b65501ed8d7758ae490354b7f39d52047d08
sha512: 185e477d521495103195e0895c2b2f8b51c7761c63cb6d8af2bb10d03bc408847934745da83a38bf7726f90c333c998a0eb4d836d2cbd4421ab5e887a2deb4e6
ssdeep: 384:KK+fKfzsqud1lubAK0s2y5V9yGQRSVnWLglNVd2:f+fAQqud1lKAKmy5ne+9l4
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T17603243C6ED51672E3BBDAB6CAF665C7B975B0233D02680D409743440C23F56EEA1A4E
sha3_384: 2d7b8657156d297c0f002822ae48b797605387ee8ec09ef05fa73998f5007a5dd75f192409ceaac8bd7525f02ab0937d
ep_bytes: 8bec81c4f4feffffe8000000005b6681
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan:Win32/Upatre!pz also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.GenericKDZ.100204
CAT-QuickHealTrojan.Verpackert.S12580624
SkyhighBehavesLike.Win32.Downloader.nz
McAfeeGenericATG-FABE!7418AFDA17E8
MalwarebytesGeneric.Malware.AI.DDS
VIPRETrojan.GenericKDZ.100204
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan-Downloader ( 0055c6c71 )
K7GWTrojan-Downloader ( 0049d22b1 )
CrowdStrikewin/malicious_confidence_100% (D)
ArcabitTrojan.Generic.D1876C
VirITTrojan.Win32.Upatre.CN
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDownloader.Waski.F
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Dropper.Upatre-9917176-0
KasperskyHEUR:Trojan-Dropper.Win32.Dapato.gen
BitDefenderTrojan.GenericKDZ.100204
NANO-AntivirusTrojan.Win32.DownLoad3.deckqy
AvastWin32:TrojanX-gen [Trj]
TencentTrojan-DL.Win32.Waski.zc
EmsisoftTrojan.GenericKDZ.100204 (B)
F-SecureTrojan.TR/Dropper.Gen
DrWebTrojan.DownLoad3.33795
ZillyaDownloader.Waski.Win32.50102
SophosMal/Upatre-AS
IkarusTrojan-Downloader.Win32.Waski
JiangminTrojan.Generic.aucae
AviraTR/Dropper.Gen
Antiy-AVLTrojan[Downloader]/Win32.Waski
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.TrojanDownloader.Upatre.BC@5qv3w8
MicrosoftTrojan:Win32/Upatre!pz
ZoneAlarmHEUR:Trojan-Dropper.Win32.Dapato.gen
GDataWin32.Trojan.PSE1.1ND8CBC
VaristW32/S-f170c96e!Eldorado
AhnLab-V3Trojan/Win32.Agent.R120254
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36680.ciY@aC3byNg
VBA32Trojan.Download
Cylanceunsafe
PandaTrj/Genetic.gen
RisingDownloader.Waski!1.B69C (CLASSIC)
YandexTrojan.Agent!c6HVycSAdIo
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Upatre.Gen
FortinetW32/Waski.C!tr
AVGWin32:TrojanX-gen [Trj]
Cybereasonmalicious.7cafd7
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Upatre!pz?

Trojan:Win32/Upatre!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment