Malware

Win32/Poison (file analysis)

Malware Removal

The Win32/Poison is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Poison virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Authenticode signature is invalid
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Created a process from a suspicious location
  • Installs itself for autorun at Windows startup

How to determine Win32/Poison?


File Info:

name: F6264AD9CE8757E5D40A.mlw
path: /opt/CAPEv2/storage/binaries/f0002b912135bcee83f901715002514fdc89b5b8ed7585e07e482331e4a56c06
crc32: 673C3A9A
md5: f6264ad9ce8757e5d40a4050ae1f6f9c
sha1: 256b8c23e55402cd5a83d19d6bd4c9f41ded187a
sha256: f0002b912135bcee83f901715002514fdc89b5b8ed7585e07e482331e4a56c06
sha512: 8a5a46accbd8231813a3bfbbfbd8247d0fdcc1cf44ba138f22c302604365917d69f9599270743cb7b592a6307d45a08c7220dedde152604aee7d779d6ece85ee
ssdeep: 6144:ta4InuJg58BkgqPoDH49n8Bb/cDJoyoMGGGGGGGGGGbGGGGGGGGGG6GG/DGXxeX+:tat0EAH49n8BkKHjliltOc1
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1DBB4C7D1E284D49AD41B0276CC7ADA71A517BEAA4574850F296D3D2B76F33C3202BE0F
sha3_384: 60e241822a898fd88892d5e623766fc312e0068d2cbc3470f9d0ea6d8de4dc9b9060a70e948468e427f7cf23bd7b0c81
ep_bytes: e8f0570000e978feffff8bff558bec56
timestamp: 2013-08-22 13:00:50

Version Info:

0: [No Data]

Win32/Poison also known as:

LionicTrojan.Win32.Poison.m!c
MicroWorld-eScanTrojan.GenericKD.30343625
FireEyeGeneric.mg.f6264ad9ce8757e5
McAfeeRDN/Generic BackDoor.iv
CylanceUnsafe
ZillyaTrojan.Poison.Win32.4695
SangforBackdoor.Win32.Poison.8
K7AntiVirusTrojan ( 000001181 )
AlibabaBackdoor:Win32/Poison.47a3d9c9
K7GWTrojan ( 000001181 )
Cybereasonmalicious.9ce875
SymantecBackdoor.Darkmoon.G
ESET-NOD32Win32/Poison
APEXMalicious
Paloaltogeneric.ml
KasperskyBackdoor.Win32.Poison.gwzx
BitDefenderTrojan.GenericKD.30343625
NANO-AntivirusTrojan.Win32.Poison.fbflme
AvastWin32:Malware-gen
TencentWin32.Backdoor.Poison.Ebgg
SophosTroj/Agent-AVVQ
ComodoMalware@#1xlmoq38wyj3e
DrWebTrojan.DownLoader23.57500
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_FRS.0NA103AA19
McAfee-GW-EditionRDN/Generic BackDoor.iv
EmsisoftTrojan.GenericKD.30343625 (B)
WebrootW32.Trojan.ScriptKD
AviraTR/Poison.tclzk
Antiy-AVLTrojan/Generic.ASMalwS.34E3D9A
KingsoftWin32.Heur.KVM007.a.(kcloud)
MicrosoftTrojan:Win32/Skeeyah.A
ViRobotTrojan.Win32.S.Agent.523188
GDataWin32.Backdoor.Poison.E
CynetMalicious (score: 99)
AhnLab-V3Trojan/Win32.Poison.C1789401
BitDefenderThetaGen:NN.ZedlaF.34182.du4@a0b!gRai
ALYacTrojan.GenericKD.30343625
MAXmalware (ai score=99)
VBA32Trojan.Skeeyah
TrendMicro-HouseCallTROJ_FRS.0NA103AA19
RisingTrojan.Poison!8.30D (CLOUD)
YandexTrojan.Injector!A1Y5jXhwqFQ
FortinetW32/Poison.GWZX!tr.bdr
AVGWin32:Malware-gen
PandaTrj/Chgt.C
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Win32/Poison?

Win32/Poison removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment