Trojan

How to remove “Trojan:Win32/Znyonm”?

Malware Removal

The Trojan:Win32/Znyonm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Znyonm virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Behavioural detection: Transacted Hollowing
  • Created a service that was not started
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Znyonm?


File Info:

name: ECCAE4DCB020C27DD924.mlw
path: /opt/CAPEv2/storage/binaries/0234655114d58a916da44a86530e2430084118b7df38cb35d7c6708378cb0759
crc32: 25DA2C0C
md5: eccae4dcb020c27dd9244acc06c918ed
sha1: 9fcd8eec114e8a769d19da36a2cfd7af7226eb2e
sha256: 0234655114d58a916da44a86530e2430084118b7df38cb35d7c6708378cb0759
sha512: 3fe564f3833db45541b2dd3e300731dfbc319429204cde664827ab3c66edc2e8cc187c96ff003dcc327a40f690bca702ca16a02a7fbe4b8eaf2f86ace9f82757
ssdeep: 98304:xGgdaNnnnRVNmjfJW4N66Lyq/jU/ON6SXFIAlE:HdKnPoW4NHLV/j+ON5XFIAu
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1EDF5334DB57DF9B4D02599B88B14723B0EE29ABF1BB4241429E439496EF7C87012D33B
sha3_384: 5e5c7080312f22a6a7985ef1dd35c8af9aee34415e554ae76a2f9bba726cbe38c728b8dd187e29ef52033a535db88945
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 2023-11-28 00:47:06

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: TVLand Setup
FileVersion:
LegalCopyright:
ProductName: TVLand
ProductVersion:
Translation: 0x0000 0x04b0

Trojan:Win32/Znyonm also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Injuke.16!c
Elasticmalicious (high confidence)
SkyhighBehavesLike.Win32.ObfuscatedPoly.wc
McAfeeArtemis!ECCAE4DCB020
Cylanceunsafe
ZillyaTrojan.Injuke.Win32.37799
K7AntiVirusTrojan ( 005722f11 )
AlibabaTrojanDropper:Win32/Injuke.aa0e1903
K7GWTrojan ( 005722f11 )
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 99)
APEXMalicious
ClamAVWin.Malware.Injuke-10015849-0
KasperskyUDS:Trojan.Win32.Injuke.gen
AvastOther:Malware-gen [Trj]
TencentWin32.Trojan.Injuke.Mzfl
F-SecureHeuristic.HEUR/AGEN.1332256
DrWebTrojan.Siggen22.18433
TrendMicroTROJ_FRS.0NA103LI23
SophosMal/Generic-S
JiangminTrojan.Ekstak.ciey
VaristW32/Agent.HVS.gen!Eldorado
AviraHEUR/AGEN.1332256
MicrosoftTrojan:Win32/Znyonm
ZoneAlarmUDS:Trojan.Win32.Injuke.gen
GDataWin32.Trojan.Agent.GGDZ98
AhnLab-V3Trojan/Win.DownloadAssistant.R621621
MalwarebytesTrojan.DownloadAssistant.Generic
TrendMicro-HouseCallTROJ_FRS.0NA103LI23
IkarusTrojan-Dropper.Win32.Agent
MaxSecureTrojan.Malware.74209402.susgen
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan:Win32/Znyonm?

Trojan:Win32/Znyonm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment