Trojan

Trojan:Win32/Znyonm removal guide

Malware Removal

The Trojan:Win32/Znyonm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Znyonm virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Behavioural detection: Transacted Hollowing
  • Created a service that was not started
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Znyonm?


File Info:

name: EF57CA5D8DBB47BEAB10.mlw
path: /opt/CAPEv2/storage/binaries/581ded100cddeef61e625daad38ce0971df5571cf7295704b8a1ca284fa4fce1
crc32: 98C34FE9
md5: ef57ca5d8dbb47beab1045b735ab9c72
sha1: 575f58447413b16180505785b0c3156d59aad59f
sha256: 581ded100cddeef61e625daad38ce0971df5571cf7295704b8a1ca284fa4fce1
sha512: 7a3872fa33050bafc046181ababf095cc388e24f05a40982458bb88034cb27e1dea58ce573ba787578e1ca9c22c9a3d960c8bf0f32d3aff12fe11be5cfcbfaba
ssdeep: 98304:foMd9WqCSk4EGkBijqVx8g2E33MyyLF1qbVA4ZVJc1GlE:w6KSkukgj4BBaLFCrVJc1Gu
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1AE36335348E8E075D0C301727FF1AA417DF2B95AFC78CA4C39991D1A8F731B6A07AA16
sha3_384: 50c652de97c24f41050be713edf501cbeae2ea1facbbd16b3144311e327066a7a9f9c8fabfa8bb1d889ccd5401f97eee
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 2023-11-25 00:57:10

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: TVGood Setup
FileVersion:
LegalCopyright:
ProductName: TVGood
ProductVersion:
Translation: 0x0000 0x04b0

Trojan:Win32/Znyonm also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Injuke.16!c
DrWebTrojan.Siggen22.15436
SkyhighBehavesLike.Win32.ObfuscatedPoly.rc
Cylanceunsafe
ZillyaTrojan.Injuke.Win32.37798
K7AntiVirusTrojan ( 005722fe1 )
AlibabaTrojanDropper:Win32/Injuke.859f547d
K7GWTrojan ( 005722fe1 )
CrowdStrikewin/malicious_confidence_100% (W)
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Malware.Windigo-10015642-0
KasperskyTrojan.Win32.Injuke.jlzj
AvastOther:Malware-gen [Trj]
TencentWin32.Trojan.Injuke.Ywhl
SophosMal/Generic-S
F-SecureHeuristic.HEUR/AGEN.1332570
TrendMicroTROJ_FRS.0NA103LF23
JiangminTrojan.Ekstak.ciey
VaristW32/Agent.HVN.gen!Eldorado
AviraHEUR/AGEN.1332570
KingsoftWin32.Trojan.Injuke.jlzj
MicrosoftTrojan:Win32/Znyonm
ViRobotTrojan.Win.Z.Agent.5004696.EO
ZoneAlarmTrojan.Win32.Injuke.jlzj
GDataWin32.Trojan.Agent.2OO43G
AhnLab-V3Trojan/Win.DownloadAssistant.R621621
McAfeeArtemis!EF57CA5D8DBB
MalwarebytesTrojan.Dropper
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_FRS.0NA103LF23
YandexTrojan.Injuke!704sHqoJcHo
IkarusTrojan-Dropper.Win32.Agent
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Znyonm?

Trojan:Win32/Znyonm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment