Malware

W32/Sohana-CU removal guide

Malware Removal

The W32/Sohana-CU is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What W32/Sohana-CU virus can do?

  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Creates an autorun.inf file
  • Authenticode signature is invalid
  • Attempts to identify installed AV products by registry key
  • Detects the presence of Windows Defender AV emulator via files
  • Attempts to disable System Restore
  • Attempts to disable Windows File Protection aka System File Checker.
  • Touches a file containing cookies, possibly for information gathering
  • Attempts to modify or disable Security Center warnings
  • Attempts to modify Explorer settings to prevent file extensions from being displayed
  • Attempts to modify Explorer settings to prevent hidden files from being displayed
  • Yara detections observed in process dumps, payloads or dropped files

How to determine W32/Sohana-CU?


File Info:

name: 29F863510DBF5034E6F5.mlw
path: /opt/CAPEv2/storage/binaries/761b1f6a92dfd9b0b0dd16cc3729abdac6c54032489d0b785e6417c0801fb5d2
crc32: 40CCB5A8
md5: 29f863510dbf5034e6f52b5e77833fa6
sha1: 5a0a9e22fd52b7c3fb2d3dc622539c30abc61fec
sha256: 761b1f6a92dfd9b0b0dd16cc3729abdac6c54032489d0b785e6417c0801fb5d2
sha512: 99e07f79451cd7ccd71ba0672be8496ce7c334c31f22977e6e1db74d229fe2f7fe6b09b39e13a7bb38cb1eaacdaa33a75c9d621791a998a9bd538e8a5014b228
ssdeep: 3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ8:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIx
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16C4412C2A6D95AE5ECC619771A23DF841F56FE3169C60A10BA04B16F49F7381AA13323
sha3_384: 1d2035b50bb3d3246ec81c37e4d76aa20b6df0afd8a914a7b1603938ed33b52e0b8ea66a0cff7baa565d6486b0e23220
ep_bytes: 60be002046008dbe00f0f9ff57eb0b90
timestamp: 2007-09-10 14:57:50

Version Info:

FileDescription:
Virus.Name.: ., ., ., .
Nuyer.........: ...... .. ...... : ., ., ., .
Translation: 0x0809 0x04b0

W32/Sohana-CU also known as:

BkavW32.FakeDocD.fam.Trojan
LionicWorm.Win32.AutoIt.l3OL
Elasticmalicious (moderate confidence)
MicroWorld-eScanTrojan.GenericKD.39797778
FireEyeGeneric.mg.29f863510dbf5034
CAT-QuickHealWorm.AutoIt.Yuner.A
SkyhighBehavesLike.Win32.Yahlover.dc
McAfeeW32/YahLover.worm.o
Cylanceunsafe
ZillyaWorm.AutoIt.Win32.16950
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005506171 )
AlibabaWorm:Win32/Yuner.c3d9684f
K7GWTrojan ( 005506171 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaAI:Packer.682689CA1D
VirITWorm.Win32.AutoIt.R
SymantecW32.Badday.A
ESET-NOD32Win32/Yuner.B
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Trojan.Generic-42
KasperskyWorm.Win32.AutoIt.r
BitDefenderTrojan.GenericKD.39797778
NANO-AntivirusTrojan.Script.Agent.dbvlfz
SUPERAntiSpywareTrojan.Agent/Gen-Yuner
AvastAutoIt:Dropper-D [Drp]
TencentWorm.Win32.AutoRun.f
TACHYONWorm/W32.AutoRun.524850
EmsisoftTrojan.GenericKD.39797778 (B)
BaiduAutoIt.Worm.Yuner.a
F-SecureWorm:W32/AutoIt.gen!A
DrWebWin32.HLLW.Autohit.18448
VIPRETrojan.GenericKD.39797778
TrendMicroWORM_AUTORUN.BWK
Trapminemalicious.high.ml.score
SophosW32/Sohana-CU
JiangminTrojanDownloader.JS.hi
VaristW32/A-91e93787!Eldorado
AviraWORM/Autorun.109873
Antiy-AVLWorm/Win32.Yuner
Kingsoftmalware.kb.b.890
MicrosoftWorm:Win32/Yuner.A
XcitiumWorm.Win32.AutoIt.~AN@1x7nl
ArcabitTrojan.Generic.D25F4412
ViRobotWorm.Win32.AutoIt.261440
ZoneAlarmWorm.Win32.AutoIt.r
GDataWin32.Trojan.PSE.ET15YT
GoogleDetected
AhnLab-V3Win32/Hybris.worm.261539
VBA32Worm.Autoit.Autorunner
ALYacTrojan.GenericKD.39797778
MAXmalware (ai score=100)
MalwarebytesGeneric.Trojan.Malpack.DDS
PandaW32/Sohanat.GW.worm
ZonerWorm.Win32.22192
TrendMicro-HouseCallWORM_AUTORUN.BWK
RisingWorm.Win32.AutoIt.bz (CLASSIC)
YandexTrojan.Autoit.Gen.IN
IkarusWorm.Win32.AutoRun
MaxSecureWorm.AutoRun.but
FortinetW32/Agent.ALS!tr
AVGAutoIt:Dropper-D [Drp]
Cybereasonmalicious.10dbf5
DeepInstinctMALICIOUS
alibabacloudWorm:Win/Yuner.B

How to remove W32/Sohana-CU?

W32/Sohana-CU removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment