Categories: Trojan

UDS:Trojan.Win32.Injuke.jgun (file analysis)

The UDS:Trojan.Win32.Injuke.jgun is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What UDS:Trojan.Win32.Injuke.jgun virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Behavioural detection: Transacted Hollowing
  • CAPE detected the embedded win api malware family
  • Created a service that was not started
  • Uses suspicious command line tools or Windows utilities
  • Yara detections observed in process dumps, payloads or dropped files

How to determine UDS:Trojan.Win32.Injuke.jgun?


File Info:

name: CEB187EA5A76744013E4.mlwpath: /opt/CAPEv2/storage/binaries/0fdd50a9f39e6aea1fec3ad53aadcad4b9f24a13337afe3b9cd77e8fd57c2fcecrc32: 0B378333md5: ceb187ea5a76744013e4bf93e488e744sha1: 853f8c14bfed922592664814a36e814d040fed07sha256: 0fdd50a9f39e6aea1fec3ad53aadcad4b9f24a13337afe3b9cd77e8fd57c2fcesha512: f191c8ed60def5060222ce224739d8b3721d0b86b6db7f46add765de1c7e819e8c02c729fec4717a64eaca6eafe36597b287dfa8b71bec283b9df06bd1a605acssdeep: 98304:Z4UQ13eDvQYGAyN/N99Ewn91ougfcSndlhRwcY3m5MXQBLuYZq0lE:lNTQUyJN99EjfRdlhRhY3UBLFFutype: PE32 executable (GUI) Intel 80386, for MS Windowstlsh: T1F44633869F62C83DF3DAA574317868863AE0BD43653943A8376C195C2BC336896733B5sha3_384: aca716b73d562acce091e87b54c51bcb32297694e96c54359d43f183dbf8ad3e8c73248a66f6fadd53cd16221e52e1bdep_bytes: 558bec83c4c453565733c08945f08945timestamp: 2023-11-24 05:03:57

Version Info:

Comments: This installation was built with Inno Setup.CompanyName: FileDescription: CrossTV Setup FileVersion: LegalCopyright: ProductName: CrossTV ProductVersion: Translation: 0x0000 0x04b0

UDS:Trojan.Win32.Injuke.jgun also known as:

Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Injuke.16!c
Elastic malicious (high confidence)
Skyhigh BehavesLike.Win32.ObfuscatedPoly.tc
McAfee Artemis!CEB187EA5A76
Cylance unsafe
Zillya Trojan.Injuke.Win32.37804
K7AntiVirus Trojan ( 005722f11 )
Alibaba Trojan:Win32/Injuke.3bcd2385
K7GW Trojan ( 005722f11 )
Symantec Trojan.Gen.MBT
ESET-NOD32 Win32/TrojanDropper.Agent.SLC
APEX Malicious
Cynet Malicious (score: 100)
Kaspersky UDS:Trojan.Win32.Injuke.jgun
Avast Other:Malware-gen [Trj]
Tencent Win32.Trojan.Injuke.Edhl
F-Secure Heuristic.HEUR/AGEN.1332570
DrWeb Trojan.Siggen22.15860
TrendMicro TROJ_FRS.0NA103LF23
Sophos Mal/Generic-S
Ikarus Trojan-Dropper.Win32.Agent
Jiangmin Trojan.Ekstak.ciey
Avira HEUR/AGEN.1332570
Kingsoft Win32.Trojan.Injuke.jgun
Microsoft Trojan:Win32/ICLoader.JLK!MTB
ZoneAlarm UDS:Trojan.Win32.Injuke.jgun
GData Win32.Trojan.Agent.TZOKX7
Varist W32/Agent.HVM.gen!Eldorado
AhnLab-V3 Trojan/Win.DownloadAssistant.R621621
Malwarebytes Trojan.Dropper
Panda Trj/Genetic.gen
TrendMicro-HouseCall TROJ_FRS.0NA103LF23
MaxSecure Trojan.Malware.220768354.susgen
Fortinet W32/Agent.SLC!tr
AVG Other:Malware-gen [Trj]
DeepInstinct MALICIOUS

How to remove UDS:Trojan.Win32.Injuke.jgun?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago