Trojan

WinGo/TrojanDropper.Agent.Z malicious file

Malware Removal

The WinGo/TrojanDropper.Agent.Z is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What WinGo/TrojanDropper.Agent.Z virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Possible date expiration check, exits too soon after checking local time
  • Creates RWX memory
  • Checks adapter addresses which can be used to detect virtual network interfaces
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • Uses Windows utilities to enumerate running processes
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Detects the presence of Wine emulator via function name
  • Deletes its original binary from disk
  • Attempts to modify desktop wallpaper
  • Created a process from a suspicious location
  • Attempts to modify proxy settings
  • Deletes executed files from disk
  • Harvests cookies for information gathering
  • Uses suspicious command line tools or Windows utilities

How to determine WinGo/TrojanDropper.Agent.Z?


File Info:

name: F7CA3AE77C1B7BD449E4.mlw
path: /opt/CAPEv2/storage/binaries/918989e42664a63b871436325fb105a542ccb05d54504366ba1ede26d1a97839
crc32: 88425742
md5: f7ca3ae77c1b7bd449e425307548f950
sha1: e3c67b321fd79e1c195a7411f80c261e65f88c7c
sha256: 918989e42664a63b871436325fb105a542ccb05d54504366ba1ede26d1a97839
sha512: 5c4076d1ab98839d4fd4f8721d941b680fbd73fb808d659b1b12994a6c0611158778c3531f585ef30fa0c5fc2ab569bfd1fbb91a93e1d24346f19874be7693a0
ssdeep: 49152:jdtxTSfJhJxGazJdEa4fkQI1B8MFZGsReGF2E1FPK0AKiIz83tptrUZ/rX2Zw7TV:jhTg
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C0C62251FCEB58B6D619963004A797EF1320AE089F30DACBD6907B6B683BBD10C33565
sha3_384: 8e3c14da047384cd4704f321aee98de6e0a890c78f1358ca47fa61d0adc8ad23620c792ff9af52a0abc11f8aa230d124
ep_bytes: e9abddffffcccccccccccccccccccccc
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

WinGo/TrojanDropper.Agent.Z also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win64.Shelma.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.50274211
McAfeeArtemis!F7CA3AE77C1B
CylanceUnsafe
ZillyaTrojan.Shelma.Win64.7839
K7AntiVirusRiskware ( 00584baa1 )
AlibabaTrojanDropper:Win64/Shelma.8ba654a3
K7GWRiskware ( 00584baa1 )
Cybereasonmalicious.21fd79
CyrenW32/ABRisk.HDCL-7399
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of WinGo/TrojanDropper.Agent.Z
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan.Win64.Shelma.vsg
BitDefenderTrojan.GenericKD.50274211
AvastWin32:Malware-gen
TencentWin32.Trojan-dropper.Agent.Efks
Ad-AwareTrojan.GenericKD.50274211
EmsisoftTrojan.GenericKD.50274211 (B)
DrWebTrojan.Siggen17.49583
VIPRETrojan.GenericKD.50274211
TrendMicroTROJ_GEN.R002C0WEF22
McAfee-GW-EditionBehavesLike.Win32.Generic.wh
Trapminemalicious.moderate.ml.score
FireEyeGeneric.mg.f7ca3ae77c1b7bd4
SophosGeneric ML PUA (PUA)
IkarusTrojan-Dropper.WinGo.Agent
GDataTrojan.GenericKD.50274211
JiangminTrojan.Bingoml.fos
AviraTR/Shelma.ofrgi
Antiy-AVLTrojan/Generic.ASMalwS.6C82
ArcabitTrojan.Generic.D2FF1FA3
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 99)
ALYacTrojan.GenericKD.50274211
MAXmalware (ai score=89)
MalwarebytesTrojan.Dropper.GO
TrendMicro-HouseCallTROJ_GEN.R002C0WEF22
RisingTrojan.Generic@AI.100 (RDML:wAH5XaQoDFdg5L/lfXRPVA)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/PossibleThreat
BitDefenderThetaGen:NN.ZexaF.34806.@FW@aaoeTXbb
AVGWin32:Malware-gen
PandaTrj/Agent.SR
CrowdStrikewin/malicious_confidence_100% (W)

How to remove WinGo/TrojanDropper.Agent.Z?

WinGo/TrojanDropper.Agent.Z removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment