Trojan

About “Trojan:Win32/Znyonm” infection

Malware Removal

The Trojan:Win32/Znyonm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Znyonm virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Znyonm?


File Info:

name: F0F56C975EF605202001.mlw
path: /opt/CAPEv2/storage/binaries/fc553ad57616e87b97290dbdaac862927522958d0c9f73e698b8dcf8179df5a0
crc32: DA8CD4DD
md5: f0f56c975ef605202001b695cdda069d
sha1: 39b39f304b2ed65ab1d036579a8d540d7abc6e6e
sha256: fc553ad57616e87b97290dbdaac862927522958d0c9f73e698b8dcf8179df5a0
sha512: 843fb38f0a2060227fd62789633c5c534d6af9dea127c5f80cb5199de0c5fa48dd0bd6feab29da184ae54547b5ac9e08479ead1e655370d28a331f84464dd3ed
ssdeep: 393216:0Ab2VebxG7SvYCqsrLH1HG9NdcXhrnu0o:js7Sv/rLVuoXhrc
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T171E6336E02CD4D3BD940973178F289B88BD20D09589D864BD1B0FD96E04EA67BF1ADF4
sha3_384: ff13d831a17807bfe75daf643973ada3ab07dbac8d9d5fac29e8c1aedd506820eac1e454402109e45f38ef47417532b7
ep_bytes: b8e855da015064ff3500000000648925
timestamp: 2023-10-25 02:19:06

Version Info:

0: [No Data]

Trojan:Win32/Znyonm also known as:

LionicTrojan.Win32.Badur.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Midie.135978
FireEyeGeneric.mg.f0f56c975ef60520
SkyhighBehavesLike.Win32.Generic.tc
ALYacGen:Variant.Midie.135978
Cylanceunsafe
ZillyaTrojan.Badur.Win32.41926
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_70% (W)
K7GWAdware ( 005071f51 )
K7AntiVirusAdware ( 005071f51 )
ArcabitTrojan.Midie.D2132A
BitDefenderThetaGen:NN.ZexaF.36792.@lZaa0PTqYmb
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Packed.FlyStudio.AA potentially unwanted
CynetMalicious (score: 100)
APEXMalicious
KasperskyUDS:Trojan.Win32.Badur
BitDefenderGen:Variant.Midie.135978
AvastWin32:TrojanX-gen [Trj]
EmsisoftGen:Variant.Midie.135978 (B)
F-SecureHeuristic.HEUR/AGEN.1338680
VIPREGen:Variant.Midie.135978
TrendMicroTROJ_GEN.R002C0XJV23
Trapminemalicious.high.ml.score
SophosGeneric Reputation PUA (PUA)
SentinelOneStatic AI – Suspicious PE
JiangminTrojan.Badur.ww
AviraHEUR/AGEN.1338680
Antiy-AVLTrojan[Packed]/Win32.FlyStudio
XcitiumTrojWare.Win32.Agent.OSCF@5rs7jr
MicrosoftTrojan:Win32/Znyonm
ZoneAlarmUDS:Trojan.Win32.Badur
GDataWin32.Trojan.PSE.1L3B2LY
VaristW32/ABRisk.GILI-2443
AhnLab-V3Trojan/Win.TrojanX-gen.R524182
Acronissuspicious
McAfeeArtemis!F0F56C975EF6
MAXmalware (ai score=87)
MalwarebytesGeneric.Malware.AI.DDS
TrendMicro-HouseCallTROJ_GEN.R002C0XJV23
RisingTrojan.Znyonm!8.18A3A (CLOUD)
MaxSecureTrojan.Malware.74007784.susgen
FortinetRiskware/FlyStudio
AVGWin32:TrojanX-gen [Trj]
Cybereasonmalicious.04b2ed
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Znyonm?

Trojan:Win32/Znyonm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment