Worm

Should I remove “Worm.Win32.Yah.a”?

Malware Removal

The Worm.Win32.Yah.a is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Worm.Win32.Yah.a virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Created a process from a suspicious location
  • Installs itself for autorun at Windows startup
  • Attempts to disable UAC
  • Attempts to modify UAC prompt behavior

How to determine Worm.Win32.Yah.a?


File Info:

name: 75523BBF4F40A4EF42D5.mlw
path: /opt/CAPEv2/storage/binaries/e97505c1979e08ee395e57c9a10a1d8ed9c4f0c8cbba0ee36105646e6e8d8615
crc32: 0BB6350E
md5: 75523bbf4f40a4ef42d562e7c4003b2b
sha1: bc5b893175b9670054b183abde7332dc13d4aa73
sha256: e97505c1979e08ee395e57c9a10a1d8ed9c4f0c8cbba0ee36105646e6e8d8615
sha512: 36dbd774eee457301ca3a54394e4bfa7a60379d24d087beb78528f19f58bf24f7907d22553867ed44cfe6352f5e59f0524a01ed4e46c6f5215ee72e797931618
ssdeep: 12288:UVgvmzFHi0mo5aH0qMzd58D7F0PJQPDHvd:UVgvOHi0mGaH0qSdEFO4V
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14476B037B781C8F2C49580317299AE135EF9AC701524EA57DB60CE093EF91E5D72A38B
sha3_384: d9a260e3d68d95f2bcbd568455b8c1b7d38c99af600641c17f9bad16db052b8c7547264e093cd761c1c4a19f0a8f43f2
ep_bytes: 6a6068f8b74200e8edf7ffffbf940000
timestamp: 2006-12-09 02:52:17

Version Info:

0: [No Data]

Worm.Win32.Yah.a also known as:

BkavW32.FamVT.DxlMC4TTc.Worm
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Pykspa.1
FireEyeGeneric.mg.75523bbf4f40a4ef
CAT-QuickHealWorm.Pykspa.C3
McAfeeW32/Pykse.worm.gen.a
CylanceUnsafe
ZillyaBackdoor.PePatch.Win32.23386
K7AntiVirusTrojan ( 003da8d71 )
K7GWTrojan ( 003da8d71 )
Cybereasonmalicious.f4f40a
BitDefenderThetaGen:NN.ZexaF.34294.@pW@aCp5yaj
CyrenW32/Pykspa.A.gen!Eldorado
SymantecW32.Pykspa.D
ESET-NOD32Win32/AutoRun.Agent.TG
BaiduWin32.Worm.Autorun.o
TrendMicro-HouseCallTROJ_AGENT_006376.TOMB
ClamAVWin.Worm.Autorun-437
KasperskyWorm.Win32.Yah.a
BitDefenderGen:Variant.Pykspa.1
NANO-AntivirusTrojan.Win32.AntiAV.dsnxsg
AvastWin32:Renos-KY [Trj]
TencentTrojan.Win32.BitCoinMiner.la
Ad-AwareGen:Variant.Pykspa.1
EmsisoftGen:Variant.Pykspa.1 (B)
ComodoWorm.Win32.Autorun.Agent_TG0@1isiwy
DrWebTrojan.Kypes.2
VIPREWorm.Win32.Skyper.b (v)
TrendMicroTROJ_AGENT_006376.TOMB
McAfee-GW-EditionBehavesLike.Win32.Pykse.wz
SophosML/PE-A + W32/Skyper-B
IkarusTrojan.Agent
GDataGen:Variant.Pykspa.1
JiangminTrojan/Vilsel.cgx
WebrootW32.Trojan.Gen
AviraTR/Agent.327680.A
MAXmalware (ai score=82)
Antiy-AVLTrojan/Generic.ASMalwS.2ADE
KingsoftHeur.SSC.1767.1216.(kcloud)
ArcabitTrojan.Pykspa.1
ViRobotTrojan.Win32.Blocker.Gen.B
APEXMalicious
MicrosoftWorm:Win32/Pykspa.C
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Zepfod.R4378
Acronissuspicious
VBA32Worm.Yah
ALYacGen:Variant.Pykspa.1
TACHYONWorm/W32.Yah.7417856
MalwarebytesWorm.Agent
RisingMalware.Heuristic!ET#100% (RDMK:cmRtazoYjqBCMEk59Sm7WileU3d8)
YandexTrojan.GenAsa!qHVVdB/AORM
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_99%
FortinetW32/Agent.XEK!tr
AVGWin32:Renos-KY [Trj]
PandaW32/SpySkype.E
CrowdStrikewin/malicious_confidence_100% (D)
MaxSecureBackdoor.Zepfod.A

How to remove Worm.Win32.Yah.a?

Worm.Win32.Yah.a removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment