Trojan

VHO:Trojan.Win32.Injuke.fhbh removal guide

Malware Removal

The VHO:Trojan.Win32.Injuke.fhbh is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What VHO:Trojan.Win32.Injuke.fhbh virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Detects Sandboxie through the presence of a library
  • Detects Avast Antivirus through the presence of a library
  • Behavioural detection: Injection (inter-process)
  • Created a process from a suspicious location
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization

How to determine VHO:Trojan.Win32.Injuke.fhbh?


File Info:

name: 06551DD19FF370D50CC6.mlw
path: /opt/CAPEv2/storage/binaries/44faebd293e9be0baff67fea2a35d77596a23aab2aed88e412b7480970c1ca21
crc32: 4346BE78
md5: 06551dd19ff370d50cc60eff16cd8f3c
sha1: 28a78b84bc4dfa6748b5e9a2ffda1eceba5a11b4
sha256: 44faebd293e9be0baff67fea2a35d77596a23aab2aed88e412b7480970c1ca21
sha512: dd3d49a5c60cad80006f445b41a265a1a8a4df5c7f6074f653428ec76cf6e09c1fe8deab905057fa0e33d6b13c798f35740d0efb43a3f2690daa0cd1babe3f93
ssdeep: 3072:FMdo1GFTd0v3xcoiy0gFUlmiuegrrhsJVggjcGkNIVqIbM/h3:F4oYoOy0PrueA2r7ITsq0
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B3548CE27690D831D0953A37C8658EA45E7FBC01DA6096CB3278379E6F732C09A2571F
sha3_384: 577f2f7ecc2115f6f634d9ab5c48d835e55a21e5c0bfb7854e73b6e3bee4b3b60b175c706ce5695b1d2373c35f940712
ep_bytes: e8b6460000e978feffffcccce8370000
timestamp: 2021-05-09 19:33:52

Version Info:

InternationalName: bomgvioci.iwa
Copyright: Copyrighz (C) 2021, fudkort
ProjectVersion: 3.14.72.77
Translation: 0x0129 0x07bc

VHO:Trojan.Win32.Injuke.fhbh also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
FireEyeGeneric.mg.06551dd19ff370d5
CylanceUnsafe
SangforTrojan.Win32.Save.a
Cybereasonmalicious.4bc4df
BitDefenderThetaGen:NN.ZexaF.34114.suW@aSofCzhK
CyrenW32/Kryptik.FWV.gen!Eldorado
SymantecML.Attribute.HighConfidence
Paloaltogeneric.ml
ClamAVWin.Dropper.Tofsee-9919472-0
KasperskyVHO:Trojan.Win32.Injuke.fhbh
AvastWin32:CrypterX-gen [Trj]
SophosML/PE-A
McAfee-GW-EditionBehavesLike.Win32.Emotet.dm
MaxSecureTrojan.Malware.300983.susgen
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
CynetMalicious (score: 100)
Acronissuspicious
McAfeePacked-GEE!06551DD19FF3
VBA32BScope.TrojanSpy.Convagent
MalwarebytesTrojan.Agent.UKED
APEXMalicious
RisingMalware.Heuristic!ET#91% (RDMK:cmRtazoMQ9lILQNl1TQCiyxBiXGk)
SentinelOneStatic AI – Malicious PE
FortinetW32/GenKryptik.ERHN!tr
AVGWin32:CrypterX-gen [Trj]
CrowdStrikewin/malicious_confidence_100% (D)

How to remove VHO:Trojan.Win32.Injuke.fhbh?

VHO:Trojan.Win32.Injuke.fhbh removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment