Trojan

Trojan:Win32/Znyonm information

Malware Removal

The Trojan:Win32/Znyonm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Znyonm virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Created a service that was not started
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Znyonm?


File Info:

name: B2C21E62F245EF141C74.mlw
path: /opt/CAPEv2/storage/binaries/2fa6427fc9cd7e11b929144d6fb3cfd6debfa284f1ce4a9ceda1d8ee644e450a
crc32: 5C6EA7C7
md5: b2c21e62f245ef141c7476574ee704b7
sha1: 6f74a93f092760e5abbb42a72fe06aadaac17ff7
sha256: 2fa6427fc9cd7e11b929144d6fb3cfd6debfa284f1ce4a9ceda1d8ee644e450a
sha512: ee4692ed8e645cbef0f564c1787308675e5754f07675200255acd081978fd9440e8d0865a072517a03ccc5e7fe07540190080554971e7452279053f54b8e191f
ssdeep: 98304:MiRmxZFsM4kxzDcT+GcY437KvDwEHuujlsaSzsC0p43MpQdZ9nc+fsCb+oSBAON6:dRm1syxacY48eda2TMpQdZ9nc+fyhNjG
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T137563358FC8E9CF9C8172831590E8A72910B7F602C5D795C3DBD664EEE3C9A0847CB66
sha3_384: 3d439f99d0b79f37340b0ee700a78a592e64e0cb2664b82ddb0830dd0ffe6b3bb844ad470b630305235e1b8b49cbab0b
ep_bytes: 558bec83c4d453565733c08945f08945
timestamp: 2023-11-05 18:00:50

Version Info:

Comments: This installation was built with Inno Setup: http://www.innosetup.com
CompanyName:
FileDescription: IsoBuster Setup
FileVersion:
InternalName:
OriginalFilename:
ProductName:
ProductVersion:
Translation: 0x0409 0x04e4

Trojan:Win32/Znyonm also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Windigo.h!c
MicroWorld-eScanGen:Variant.Cerbu.193383
FireEyeGen:Variant.Cerbu.193383
SkyhighBehavesLike.Win32.ObfuscatedPoly.tc
ALYacGen:Variant.Genie.290
MalwarebytesMalware.AI.4284112672
VIPREGen:Variant.Cerbu.193383
SangforTrojan.Win32.Agent.Vpgm
BitDefenderGen:Variant.Cerbu.193383
CrowdStrikewin/malicious_confidence_70% (W)
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 100)
APEXMalicious
KasperskyHEUR:Trojan-Proxy.Win32.Windigo.gen
TencentWin32.Trojan-Proxy.Windigo.Wwhl
SophosGeneric Reputation PUA (PUA)
DrWebTrojan.MulDrop24.9750
TrendMicroTROJ_GEN.R002C0XK623
EmsisoftGen:Variant.Cerbu.193383 (B)
GDataGen:Variant.Cerbu.193383
JiangminTrojanProxy.Windigo.g
VaristW32/Trojan.OPPG-1630
Kingsoftmalware.kb.a.714
ArcabitTrojan.Cerbu.D2F367
ZoneAlarmHEUR:Trojan-Proxy.Win32.Windigo.gen
MicrosoftTrojan:Win32/Znyonm
AhnLab-V3Trojan/Win.Malware-gen.R620739
McAfeeArtemis!B2C21E62F245
MAXmalware (ai score=86)
DeepInstinctMALICIOUS
PandaTrj/Chgt.AD
TrendMicro-HouseCallTROJ_GEN.R002C0XK623
YandexTrojan.PR.Windigo!gHn3ItGOtTw
AVGOther:Malware-gen [Trj]
AvastOther:Malware-gen [Trj]

How to remove Trojan:Win32/Znyonm?

Trojan:Win32/Znyonm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment