Trojan

Trojan:Win32/Znyonm malicious file

Malware Removal

The Trojan:Win32/Znyonm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Znyonm virus can do?

  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Trojan:Win32/Znyonm?


File Info:

name: 752EA2C2FDC34DE9CD8E.mlw
path: /opt/CAPEv2/storage/binaries/fd03ea32f520aa57ee6b4e29eedf1c897857f9368933c2bb3367d2016dc27454
crc32: 3BA490E6
md5: 752ea2c2fdc34de9cd8e50b0e35df912
sha1: a4a17fa6922d833f12ad2530a8431cac88b7ae81
sha256: fd03ea32f520aa57ee6b4e29eedf1c897857f9368933c2bb3367d2016dc27454
sha512: 69e43fe185c34c9785155a115405f8d54580fccae8146c3272559e6896a1f7eda46384a684ded092109975ce5066c495e6495f7b418463390c2a735bbb50fb14
ssdeep: 24576:IcLWn6QUUK3k4ntAL/IDpgpJKHj9UAdOj8XyBzfDWEnGARtby0Bpmz:IcL003lkI1gpJKHBUScR3JyEpo
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1E945331BA233B337FBC6C733967E15D0F1C948D9A1D07AAA584446AB8966F703570C8D
sha3_384: 858f9fa80935d2fdff198b5d620e436c4d0ed4132e1940b1167a3d522a35864fea4e0dc0ca4272953cd9933bebbe8eca
ep_bytes: 60be154065008dbeebcfdaff5783cdff
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan:Win32/Znyonm also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Agent.Y!c
Elasticmalicious (moderate confidence)
MicroWorld-eScanGen:Variant.Lazy.407549
FireEyeGen:Variant.Lazy.407549
SkyhighBehavesLike.Win32.Generic.tc
McAfeeArtemis!752EA2C2FDC3
Cylanceunsafe
ZillyaTrojan.Agent.Win32.3734481
SangforSuspicious.Win32.Save.a
K7AntiVirusRiskware ( 0040eff71 )
K7GWRiskware ( 0040eff71 )
Cybereasonmalicious.6922d8
ArcabitTrojan.Lazy.D637FD
VirITTrojan.Win32.GenusB.DSXH
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Generik.GDSELAW
CynetMalicious (score: 100)
APEXMalicious
KasperskyTrojan-Proxy.Win32.Agent.yot
BitDefenderGen:Variant.Lazy.407549
NANO-AntivirusTrojan.Win32.LPTpBW.kcajan
AvastWin32:Malware-gen
TencentWin32.Trojan.Malware.Szfl
SophosMal/Generic-S
F-SecureTrojan.TR/Crypt.XPACK.Gen
VIPREGen:Variant.Lazy.407549
TrendMicroTROJ_GEN.R002C0XIG23
Trapminemalicious.high.ml.score
EmsisoftGen:Variant.Lazy.407549 (B)
IkarusTrojan.Crypt
JiangminTrojanProxy.Agent.edf
WebrootW32.Malware.Gen
VaristW32/ABTrojan.OODS-7484
AviraTR/Crypt.XPACK.Gen
Antiy-AVLGrayWare/Win32.Kryptik.ffp
KingsoftWin32.Troj.Undef.a
MicrosoftTrojan:Win32/Znyonm
ViRobotTrojan.Win.Z.Agent.1207296
ZoneAlarmTrojan-Proxy.Win32.Agent.yot
GDataGen:Variant.Lazy.407549
GoogleDetected
AhnLab-V3Trojan/Win.Generic.C5504891
BitDefenderThetaGen:NN.ZexaF.36744.jnGfaKZIuAe
ALYacGen:Variant.Lazy.407549
MAXmalware (ai score=81)
VBA32BScope.Trojan.Win64.Agent
MalwarebytesTrojan.Dropper.GO
PandaTrj/Chgt.AD
TrendMicro-HouseCallTROJ_GEN.R002C0XIG23
RisingBackdoor.Agent!1.EBB6 (CLASSIC)
YandexTrojan.PR.Agent!nvMlcl3w7NM
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.219025662.susgen
FortinetW32/PossibleThreat
AVGWin32:Malware-gen
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan:Win32/Znyonm?

Trojan:Win32/Znyonm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment