Trojan

About “Trojan:Win32/Znyonm” infection

Malware Removal

The Trojan:Win32/Znyonm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Znyonm virus can do?

  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • .NET file is packed/obfuscated with SmartAssembly
  • Authenticode signature is invalid

How to determine Trojan:Win32/Znyonm?


File Info:

name: 43C29E5E42F4870FA4BB.mlw
path: /opt/CAPEv2/storage/binaries/cfa592b0128bc126fbf3fb66c551a8d87223b196f5e0cd87e60b88bdc688c6e0
crc32: C3307DA0
md5: 43c29e5e42f4870fa4bbb30abad26012
sha1: 392ccfa22f19f6e466a973ac654e450a62391572
sha256: cfa592b0128bc126fbf3fb66c551a8d87223b196f5e0cd87e60b88bdc688c6e0
sha512: 197d012f0f5ca0e82eea54d78dce7d4f5fae5272d2dcb2d416b4c74f089dd4229779bd5892d542b1cc557382ac4c1808abb191234fd3c4463291d292680ae339
ssdeep: 12288:KbnfV4yEZcoGnvTjARLbX+Ez5C8Q97keqjCrwQk507duFNT:K7fV4ynjnvTjCbX+Et2ZkCsQ60JM
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T140E423486718AF63DEFC4472E5E3BA292791E877C7BBE7495C4023225D513C9A62034F
sha3_384: 3f67fd6b5c44fc177b81fa8f6247a3281e010e466f14048703a534007f1ae71cbe553c474d4dbbac9b9234a42115fbb1
ep_bytes: ff250020400000000000000000000000
timestamp: 2023-07-25 13:52:44

Version Info:

Translation: 0x0000 0x04b0
Comments:
CompanyName:
FileDescription:
FileVersion: 1.0.0.0
InternalName: Dcrtykao.exe
LegalCopyright:
LegalTrademarks:
OriginalFilename: Dcrtykao.exe
ProductName:
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

Trojan:Win32/Znyonm also known as:

BkavW32.AIDetectMalware.CS
LionicTrojan.Win32.Disco.i!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Barys.20010
FireEyeGeneric.mg.43c29e5e42f4870f
SkyhighBehavesLike.Win32.Generic.jc
McAfeeRDN/Generic.dx
Cylanceunsafe
ZillyaTrojan.Disco.Win32.10358
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a6b231 )
AlibabaTrojanPSW:MSIL/Disco.964c5dc7
K7GWTrojan ( 005a6b231 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZemsilF.36744.Pm0@aKTY4lg
VirITTrojan.Win32.Genus.TTB
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Kryptik.AIZW
APEXMalicious
KasperskyHEUR:Trojan-PSW.MSIL.Disco.gen
BitDefenderGen:Variant.Barys.20010
NANO-AntivirusTrojan.Win32.Disco.jykhqp
AvastWin32:TrojanX-gen [Trj]
TencentMalware.Win32.Gencirc.13eb3f3e
EmsisoftGen:Variant.Barys.20010 (B)
F-SecureTrojan.TR/Dropper.MSIL.Gen
VIPREGen:Variant.Barys.20010
TrendMicroTROJ_GEN.R002C0PH223
Trapminemalicious.moderate.ml.score
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
GoogleDetected
AviraTR/Dropper.MSIL.Gen
Antiy-AVLTrojan/MSIL.Kryptik
Kingsoftmalware.kb.c.1000
MicrosoftTrojan:Win32/Znyonm
ArcabitTrojan.Barys.D4E2A
ZoneAlarmHEUR:Trojan-PSW.MSIL.Disco.gen
GDataGen:Variant.Barys.20010
VaristW32/ABRisk.TDOI-7454
AhnLab-V3Trojan/Win.Generic.C5522684
VBA32TScope.Trojan.MSIL
ALYacGen:Variant.Barys.20010
MAXmalware (ai score=82)
MalwarebytesMalware.AI.2812160239
PandaTrj/Chgt.AD
TrendMicro-HouseCallTROJ_GEN.R002C0PH223
RisingMalware.Obfus/MSIL@AI.86 (RDM.MSIL2:clOBPi/3YPGBgp2nVwCUKA)
IkarusTrojan.MSIL.Krypt
MaxSecureTrojan.Malware.115904540.susgen
FortinetMSIL/Kryptik.AIZW!tr
AVGWin32:TrojanX-gen [Trj]
Cybereasonmalicious.22f19f
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Znyonm?

Trojan:Win32/Znyonm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment