Worm

Should I remove “Worm:Win32/Pykspa.D”?

Malware Removal

The Worm:Win32/Pykspa.D is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Worm:Win32/Pykspa.D virus can do?

  • Attempts to connect to a dead IP:Port (2 unique times)
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Sniffs keystrokes
  • Created a process from a suspicious location
  • Installs itself for autorun at Windows startup
  • Anomalous binary characteristics

How to determine Worm:Win32/Pykspa.D?


File Info:

name: DA38C4448BA061186B96.mlw
path: /opt/CAPEv2/storage/binaries/f81e6fefc0edd22d9e0dc40b83a788df965610013df528e88db9b6da48da53d9
crc32: 8F95F91E
md5: da38c4448ba061186b96b02834f18f8c
sha1: 7c2327f6d7e673c0c5f6fa9b804ba36612012755
sha256: f81e6fefc0edd22d9e0dc40b83a788df965610013df528e88db9b6da48da53d9
sha512: e4477cecf4362d70dcdb0f44fa9a0ad1f86ed9b65349aef577d2349aaff6fc40b026a29d84611968e39e3e9e5ea9431d61bd371f291e0a1411eeca0c4f5c955d
ssdeep: 1536:MYjxvZtefzgSFXf2rr3hR9AuyEq7lERyKqoIYJ:zBefzgSRK3hLHyEmlboV
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T132836E70A6640D7EDF1756FD604E94EE66DEDEA212C6002A37F192C28B20798C45EE2C
sha3_384: 8dedd2cdc9ecbf31463ba49caeb7ec7362f333180afe4fd1b775a1e3de65c4b9943c375e4451d6a06ac21d1d5aed5b1f
ep_bytes: 558bec81ec18010000c785ecfeffff68
timestamp: 2008-02-03 16:22:15

Version Info:

0: [No Data]

Worm:Win32/Pykspa.D also known as:

Elasticmalicious (high confidence)
ClamAVWin.Dropper.Agent-34433
CAT-QuickHealTrojan.Mauvaise.SL1
McAfeeGeneric Dropper.ahs
MalwarebytesMalware.AI.3345856151
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_70% (D)
BitDefenderDropped:Trojan.Dropper.SOH
K7GWTrojan ( 004c7d531 )
K7AntiVirusTrojan ( 004c7d531 )
CyrenW32/Trojan2.CKNR
ESET-NOD32Win32/TrojanDropper.Small.NIN
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan-Ransom.Win32.Blocker.horu
NANO-AntivirusTrojan.Win32.Agent.lpuf
MicroWorld-eScanDropped:Trojan.Dropper.SOH
AvastWin32:Agent-VGF [Trj]
RisingTrojan.Generic@AI.100 (RDML:7QZfxFbic2ZRvz7aCw6+vA)
Ad-AwareDropped:Trojan.Dropper.SOH
EmsisoftDropped:Trojan.Dropper.SOH (B)
ComodoTrojWare.Win32.TrojanDropper.Small.~BD@1177d
DrWebBackDoor.Fox
ZillyaTrojan.Agent.Win32.41698
McAfee-GW-EditionBehavesLike.Win32.PWSZbot.mc
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.da38c4448ba06118
SophosML/PE-A + Troj/Agent-JZL
IkarusTrojan-Spy.Win32.Agent.bff
GDataDropped:Trojan.Dropper.SOH
JiangminTrojanSpy.Agent.crt
AviraTR/Dropper.Gen
MAXmalware (ai score=89)
ZoneAlarmTrojan-Ransom.Win32.Blocker.horu
MicrosoftWorm:Win32/Pykspa.D
AhnLab-V3Trojan/Win32.Agent.C57465
VBA32BScope.TrojanRansom.Blocker
ALYacDropped:Trojan.Dropper.SOH
CylanceUnsafe
YandexTrojan.GenAsa!9ApGhdHajGA
SentinelOneStatic AI – Malicious PE
FortinetW32/Dropper.BDR!tr
BitDefenderThetaAI:Packer.F2F72E161F
AVGWin32:Agent-VGF [Trj]
Cybereasonmalicious.48ba06
PandaTrj/Genetic.gen

How to remove Worm:Win32/Pykspa.D?

Worm:Win32/Pykspa.D removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment