Trojan

About “Trojan:Win32/Ymacco.ABAD” infection

Malware Removal

The Trojan:Win32/Ymacco.ABAD is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Ymacco.ABAD virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • A process created a hidden window
  • Drops a binary and executes it
  • Performs some HTTP requests
  • The executable is compressed using UPX
  • Uses Windows utilities for basic functionality
  • Network activity contains more than one unique useragent.
  • Installs itself for autorun at Windows startup
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Creates a slightly modified copy of itself
  • Collects information to fingerprint the system

Related domains:

z.whorecord.xyz
a.tomx.xyz
pastebin.com
q.gs
aporasal.net

How to determine Trojan:Win32/Ymacco.ABAD?


File Info:

crc32: 09ED620C
md5: a12a86e7e1153faeb8c7b29aee836fbd
name: A12A86E7E1153FAEB8C7B29AEE836FBD.mlw
sha1: 4abe3b8a8abf0a02d32b01cd75032b6cdd6456c3
sha256: ada12159bcc8cd368e40b772d54c001b8fe3da69456ed8fae4e688928e5a10a9
sha512: d8c649d89af02573c3354ad044d5f11b4ca5c832b45d9146ff02ba2e8a262fdc4e9158d1442a3b1990a306d0c1037f623e87346bc5f614d4a89513774ed77e0a
ssdeep: 49152:UUjG9ZNgb4YVGc8cYkXyaQYVSQpejG7kueYVGc8cYkXyaQYVQ:dK9m4Y8cYkXyaQpQpejGwueY8cYkXyaw
type: PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed

Version Info:

0: [No Data]

Trojan:Win32/Ymacco.ABAD also known as:

BkavW32.AIDetectVM.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.576052
FireEyeGeneric.mg.a12a86e7e1153fae
ALYacGen:Variant.Razy.576052
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.Injuke.4!c
SangforMalware
K7AntiVirusTrojan ( 0057372a1 )
BitDefenderGen:Variant.Razy.576052
K7GWTrojan ( 0057372a1 )
Cybereasonmalicious.7e1153
BitDefenderThetaGen:NN.ZexaF.34804.eoZ@aG0ujDd
CyrenW32/S-91c2cc44!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:Evo-gen [Susp]
ClamAVWin.Trojan.Razy-9786045-0
KasperskyHEUR:Trojan.Win32.Injuke.vho
AlibabaTrojan:Win32/Injector.996dd544
NANO-AntivirusTrojan.Win32.Downloader.idjesn
TencentWin32.Trojan.Injuke.Liqc
Ad-AwareGen:Variant.Razy.576052
SophosML/PE-A + Troj/Agent-BFYM
ComodoPacked.Win32.MUPX.Gen@24tbus
F-SecureTrojan.TR/Patched.Ren.Gen
TrendMicroPAK_Xed-10
McAfee-GW-EditionBehavesLike.Win32.Generic.vm
EmsisoftGen:Variant.Razy.576052 (B)
IkarusTrojan.Win32.Injector
JiangminTrojan.Injuke.fpr
AviraTR/Patched.Ren.Gen
MAXmalware (ai score=100)
Antiy-AVLTrojan/Win32.Wacatac
MicrosoftTrojan:Win32/Ymacco.ABAD
ArcabitTrojan.Razy.D8CA34
ZoneAlarmHEUR:Trojan.Win32.Injuke.vho
GDataGen:Variant.Razy.576052
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R263763
McAfeeGenericRXAA-AA!A12A86E7E115
VBA32BScope.Trojan.Wacatac
MalwarebytesGeneric.Trojan.Malicious.DDS
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Injector.EBQH
TrendMicro-HouseCallPAK_Xed-10
RisingTrojan.Kryptik!1.D12D (CLOUD)
SentinelOneStatic AI – Malicious PE
FortinetW32/Injector.EBQH!tr
AVGWin32:Evo-gen [Susp]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_80% (D)
Qihoo-360Win32/Trojan.56f

How to remove Trojan:Win32/Ymacco.ABAD?

Trojan:Win32/Ymacco.ABAD removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment