Trojan

Trojan:Win32/Znyonm removal guide

Malware Removal

The Trojan:Win32/Znyonm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Znyonm virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Znyonm?


File Info:

name: C273437805259982CFDA.mlw
path: /opt/CAPEv2/storage/binaries/54eb4217e3fe267f2e1c20b4a6407abb3ed220836eba996ffe5b2bb692063201
crc32: E80DA515
md5: c273437805259982cfda1b96eb462be5
sha1: 01419f819a989e5b8fd343347cea8d85c42856ec
sha256: 54eb4217e3fe267f2e1c20b4a6407abb3ed220836eba996ffe5b2bb692063201
sha512: 1f202a9c4b279f22298f94bde0bd961551731772e6cac57a7cc3f2b4ebb0fb20c33ef62be1d1440be4e99d8f9bf53e42cbff2295ec6f4a3d8b6fd07f164683c9
ssdeep: 98304:uiRmxZFsM4kxzDcT+GcY437KvDwEHuujlsaSzsC0p43MpQdZ9nc+fsCb+oSBAON6:bRm1syxacY48eda2TMpQdZ9nc+fyhNjG
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T146563358FC8E9CF9C8172831590E8A72910B7F602C5D795C3DBD664EEE3C9A0847CB66
sha3_384: 8cc3338d198670805b7ab0a4c24531e10f4307579276873f29d19a5109cc7ee5e6a094bfdbcde5b1d76385b80c997596
ep_bytes: 558bec83c4d453565733c08945f08945
timestamp: 2023-11-06 09:22:39

Version Info:

Comments: This installation was built with Inno Setup: http://www.innosetup.com
CompanyName:
FileDescription: IsoBuster Setup
FileVersion:
InternalName:
OriginalFilename:
ProductName:
ProductVersion:
Translation: 0x0409 0x04e4

Trojan:Win32/Znyonm also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Windigo.h!c
MicroWorld-eScanGen:Variant.Cerbu.193383
FireEyeGen:Variant.Cerbu.193383
SkyhighBehavesLike.Win32.Generic.tc
ALYacGen:Variant.Cerbu.193383
MalwarebytesMalware.AI.4284112672
SangforDropper.Win32.Cerbu.V0cj
AlibabaTrojan:Win32/Windigo.8621ef6b
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 100)
APEXMalicious
KasperskyUDS:Trojan-Proxy.Win32.Windigo.gen
BitDefenderGen:Variant.Cerbu.193383
AvastOther:Malware-gen [Trj]
TencentTrojan-Proxy.Win32.Windigo.ha
EmsisoftGen:Variant.Cerbu.193383 (B)
F-SecureTrojan.TR/AD.Nekark.gyugj
DrWebTrojan.MulDrop24.9750
VIPREGen:Variant.Cerbu.193383
TrendMicroTROJ_GEN.R002C0XKC23
SophosMal/Generic-S
JiangminTrojanProxy.Windigo.g
VaristW32/Trojan.OPPG-1630
AviraTR/AD.Nekark.gyugj
MAXmalware (ai score=86)
MicrosoftTrojan:Win32/Znyonm
ArcabitTrojan.Cerbu.D2F367
ZoneAlarmUDS:Trojan-Proxy.Win32.Windigo.gen
GDataGen:Variant.Cerbu.193383
AhnLab-V3Trojan/Win.Malware-gen.R620739
McAfeeArtemis!C27343780525
PandaTrj/Chgt.AD
TrendMicro-HouseCallTROJ_GEN.R002C0XKC23
YandexTrojan.PR.Windigo!gHn3ItGOtTw
IkarusTrojan.Nekark
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_70% (W)

How to remove Trojan:Win32/Znyonm?

Trojan:Win32/Znyonm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment