Trojan

How to remove Antavka Trojan from PC?

In this post, I am going to explain how the Antavka trojan injected into your system, as well as the best way to get rid of Antavka trojan virus.

Loaris Trojan Remover
Editor's choice
Loaris Trojan Remover
Manual Antavka removal might be a lengthy and complicated process that requires expert skills. Loaris Trojan Remover is a professional antivirus tool that is recommended to get rid of this Antavka trojan.
5
EXCELLENT
⭐⭐⭐⭐⭐
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Loaris Trojan Remover. 7 days free trial available.

What is Antavka trojan?

Name Antavka
Infection Type Trojan
Symptoms
  • Behavioural detection: Executable code extraction – unpacking;
  • SetUnhandledExceptionFilter detected (possible anti-debug);
  • Yara rule detections observed from a process memory dump/dropped files/CAPE;
  • Presents an Authenticode digital signature;
  • NtSetInformationThread: attempt to hide thread from debugger;
  • Creates RWX memory;
  • Dynamic (imported) function loading detected;
  • Enumerates running processes;
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option;
  • Reads data out of its own binary image;
  • CAPE extracted potentially suspicious content;
  • Drops a binary and executes it;
  • Unconventionial language used in binary resources: Chinese (Simplified);
  • The binary contains an unknown PE section name indicative of packing;
  • The binary likely contains encrypted or compressed data.;
  • The executable is likely packed with VMProtect;
  • Authenticode signature is invalid;
  • Uses Windows utilities for basic functionality;
  • Behavioural detection: Injection (Process Hollowing);
  • Executed a process and injected code into it, probably while unpacking;
  • Deletes its original binary from disk;
  • Behavioural detection: Injection (inter-process);
  • Installs itself for autorun at Windows startup;
  • Installs itself for autorun at Windows startup;
  • CAPE detected the RunningRAT malware family;
  • Attempts to modify proxy settings;
  • CAPE detected injection into a browser process, likely for Man-In-Browser (MITB) infostealing;
  • Harvests cookies for information gathering;
  • Modifies Image File Execution Options, indicative of process injection or persistence;
  • Created a service that was not started;
  • Collects information to fingerprint the system;
  • Anomalous binary characteristics;
  • Uses suspicious command line tools or Windows utilities;
Similar behavior Discord, Schopets, Sfuzuan, Beaugrit, Otran, Gapined
Fix Tool

See If Your System Has Been Affected by Antavka trojan

Trojan The name of this type of malware is an allusion to a well-known legend about Trojan Horse, that was used by Greeks to get in the city of Troy and win the battle. Like a dummy horse that was made for trojans as a present, Antavka trojan virus is distributed like something legit, or, at least, useful. Harmful applications are stashing inside of the Antavka trojan virus, like Greeks inside of a large wooden dummy of a horse.1

Trojan viruses are one of the leading malware sorts by its injection rate for quite a long period of time. And now, throughout the pandemic, when malware got significantly active, trojan viruses enhanced their activity, too. You can see lots of messages on various sources, where users are grumbling concerning the Antavka trojan virus in their computer systems, as well as requesting aid with Antavka trojan virus removal.

Trojan Antavka is a sort of virus that injects into your computer, and afterwards performs various malicious functions. These functions depend on a sort of Antavka trojan: it might work as a downloader for other malware or as a launcher for another malicious program which is downloaded together with the Antavka trojan. Over the last two years, trojans are additionally dispersed with email add-ons, and most of cases used for phishing or ransomware infiltration.

Antavka2 also known as

Lionic Trojan.Win32.Antavka.4!c
Elastic malicious (high confidence)
DrWeb BackDoor.Pigeon.19150
MicroWorld-eScan DeepScan:Generic.Malware.PfPk!g.0AF1E458
FireEye Generic.mg.2d4cd83c24dc8923
ALYac DeepScan:Generic.Malware.PfPk!g.0AF1E458
Cylance Unsafe
Sangfor Trojan.Win32.Antavka.vl
Alibaba Trojan:Win32/Antavka.b7093209
Cybereason malicious.c24dc8
Cyren W32/Risk.FLXX-4211
Symantec Spyware.Perfect
ESET-NOD32 a variant of Win32/VB.NPK
APEX Malicious
Kaspersky Trojan.Win32.Antavka.vl
BitDefender DeepScan:Generic.Malware.PfPk!g.0AF1E458
NANO-Antivirus Trojan.Win32.Antavka.mpbfk
Avast Win32:Trojan-gen
Tencent Win32.Trojan.Antavka.Hsjc
Ad-Aware DeepScan:Generic.Malware.PfPk!g.0AF1E458
Emsisoft DeepScan:Generic.Malware.PfPk!g.0AF1E458 (B)
Comodo Malware@#2p3co35490gse
Zillya Trojan.Antavka.Win32.308
TrendMicro TROJ_GEN.R002C0DDQ22
McAfee-GW-Edition BehavesLike.Win32.VirRansom.gc
Sophos Mal/Generic-S
SentinelOne Static AI – Malicious PE
GData DeepScan:Generic.Malware.PfPk!g.0AF1E458
Jiangmin Trojan.Antavka.cw
Avira TR/Dropper.Gen
MAX malware (ai score=100)
Microsoft Trojan:Win32/Killav.CL
Cynet Malicious (score: 100)
McAfee Artemis!2D4CD83C24DC
TACHYON Trojan/W32.Antavka.436852
VBA32 BScope.Backdoor.BlackHole
Malwarebytes Malware.AI.2286499336
TrendMicro-HouseCall TROJ_GEN.R002C0DDQ22
Rising Trojan.KillAV!8.98 (CLOUD)
Yandex Trojan.PWS.Magania!7NgeTepha0Q
Ikarus Backdoor.Win32.Hupigon
Fortinet W32/Antavka.VL!tr
AVG Win32:Trojan-gen
Panda Trj/CI.A
CrowdStrike win/malicious_confidence_100% (D)

What are the symptoms of Antavka trojan?

  • Behavioural detection: Executable code extraction – unpacking;
  • SetUnhandledExceptionFilter detected (possible anti-debug);
  • Yara rule detections observed from a process memory dump/dropped files/CAPE;
  • Presents an Authenticode digital signature;
  • NtSetInformationThread: attempt to hide thread from debugger;
  • Creates RWX memory;
  • Dynamic (imported) function loading detected;
  • Enumerates running processes;
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option;
  • Reads data out of its own binary image;
  • CAPE extracted potentially suspicious content;
  • Drops a binary and executes it;
  • Unconventionial language used in binary resources: Chinese (Simplified);
  • The binary contains an unknown PE section name indicative of packing;
  • The binary likely contains encrypted or compressed data.;
  • The executable is likely packed with VMProtect;
  • Authenticode signature is invalid;
  • Uses Windows utilities for basic functionality;
  • Behavioural detection: Injection (Process Hollowing);
  • Executed a process and injected code into it, probably while unpacking;
  • Deletes its original binary from disk;
  • Behavioural detection: Injection (inter-process);
  • Installs itself for autorun at Windows startup;
  • Installs itself for autorun at Windows startup;
  • CAPE detected the RunningRAT malware family;
  • Attempts to modify proxy settings;
  • CAPE detected injection into a browser process, likely for Man-In-Browser (MITB) infostealing;
  • Harvests cookies for information gathering;
  • Modifies Image File Execution Options, indicative of process injection or persistence;
  • Created a service that was not started;
  • Collects information to fingerprint the system;
  • Anomalous binary characteristics;
  • Uses suspicious command line tools or Windows utilities;

The typical sign of the Antavka trojan virus is a gradual entrance of various malware – adware, browser hijackers, et cetera. Because of the activity of these harmful programs, your PC ends up being really slow: malware consumes big quantities of RAM and CPU capacities.

Another noticeable effect of the Antavka trojan virus presence is unknown processes displayed in task manager. Often, these processes may try to mimic system processes, however, you can understand that they are not legit by checking out the origin of these processes. Pseudo system applications and Antavka trojan’s processes are always specified as a user’s programs, not as a system’s.

How to remove Antavka trojan virus?

  • Download and install Loaris Trojan Remover.
  • Open Loaris and perform a “Standard scan“.
  • “Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Approve the reset pressing “Yes” button in the appeared window.
  • Restart your computer.

To clean up Antavka trojan and ensure that all satellite malware, downloaded with the help of this trojan, will be wiped out, as well, I’d suggest you to use Loaris Trojan Remover.

Loaris Trojan RemoverAntavka trojan virus is extremely difficult to delete by hand. Its pathways are extremely hard to track, and the modifications implemented by the Antavka trojan are concealed deeply within the system. So, the opportunity that you will make your system 100% clean of trojans is really low. And also do not ignore malware that has been downloaded with the help of the Antavka trojan virus. I assume these arguments are enough to ensure that eliminating the trojan virus manually is an awful concept.

Antavka removal guide

To detect and delete all malware on your personal computer using Loaris, it’s better to utilize Standard or Full scan. Removable scan, as well as Custom, will check only specified directories, so such types of scans are not able to provide the full information.

Scan types in Loaris

You can spectate the detects during the scan process goes. Nevertheless, to perform any actions against spotted malicious programs, you need to wait until the scan is over, or to stop the scanning process.

Loaris during the scan

To designate the special action for each detected malicious programs, choose the knob in front of the detection name of detected viruses. By default, all viruses will be moved to quarantine.

Loaris Trojan Remover after the scan process

How to remove Antavka Trojan?

Name: Antavka

Description: Trojan Antavka is a kind of virus that infiltrates into your computer, and after that performs different destructive functions. These features depend upon a type of Antavka trojan: it can act as a downloader for many other malware or as a launcher for another destructive program which is downloaded in addition to the Antavka trojan. During the last two years, trojans are also dispersed via e-mail attachments, and most of situations utilized for phishing or ransomware infiltration.

Operating System: Windows

Application Category: Trojan

Sending
User Review
4.08 (12 votes)
Comments Rating 0 (0 reviews)
  1. What is Trojan Horse: https://en.wikipedia.org/wiki/Trojan_horse_(computing)
  2. Antavka VirusTotal Report: https://www.virustotal.com/api/v3/files/00e55e418f3e450e0f33d45628b4e8fbaad975ddb81fe3eafaa9c9b792eee786

Helga Smith

I was always interested in computer sciences, especially in data security and the theme, which is called nowadays "data science", since my early teens. Because I was lack of related literature, I tried to find something in the Web, so, virus injections was usual for me. That's why I've got quite high skill while dealing with viruses on my computer. When I heard about the website with different guidelines about virus removal and anti-virus programs, I've joined him with no doubt. Before coming into Virusremoval team as Editor-in-chief, I was working as cybersecurity expert several companies, including one of Amazon contractors. Another experience I have got is teaching in Arden and Reading universities.

Leave a Reply

Your email address will not be published. Required fields are marked *

Sending

Back to top button