In this post, I am going to reveal the way the Fleercivet trojan infused right into your computer, and the best way to delete Fleercivet trojan virus.
What is Fleercivet trojan?
Name | Fleercivet |
Infection Type | Trojan |
Symptoms |
|
Similar behavior | Tonmye, Obfuscated, Witproc, Ligzoc, Togapy, Xtrat |
Fix Tool | See If Your System Has Been Affected by Fleercivet trojan |
Trojan viruses are among the leading malware kinds by its injection frequency for quite a very long time. And now, throughout the pandemic, when malware got immensely active, trojan viruses enhanced their activity, too. You can see lots of messages on diverse resources, where users are whining about the Fleercivet trojan virus in their computers, as well as requesting assisting with Fleercivet trojan virus clearing.
Trojan Fleercivet is a kind of virus that injects into your PC, and afterwards executes a wide range of malicious features. These functions depend on a kind of Fleercivet trojan: it may act as a downloader for other malware or as a launcher for an additional malicious program which is downloaded in addition to the Fleercivet trojan virus. Throughout the last 2 years, trojans are also distributed using email add-ons, and in the majority of situations used for phishing or ransomware infiltration.
Fleercivet2 also known as
DrWeb | Trojan.Packed.662 |
MicroWorld-eScan | Gen:Variant.Fugrafa.79578 |
McAfee | Artemis!0C22C48B1CE0 |
Cylance | Unsafe |
VIPRE | Trojan.Win32.Generic!BT |
AegisLab | Trojan.Win32.Injector.b!c |
Sangfor | Malware |
K7AntiVirus | Trojan ( 004f9ff91 ) |
BitDefender | Gen:Variant.Fugrafa.79578 |
K7GW | Trojan ( 004f9ff91 ) |
Cybereason | malicious.b1ce07 |
BitDefenderTheta | Gen:NN.ZexaF.34804.@F0@aauZZQii |
Cyren | W32/Injector.HT.gen!Eldorado |
Symantec | SMG.Heur!gen |
APEX | Malicious |
Avast | Win64:Malware-gen |
Kaspersky | Trojan.Win32.Bublik.fbew |
Alibaba | Trojan:Win32/Bublik.0a6e596c |
NANO-Antivirus | Trojan.Win64.Fleercivet.elcxbf |
Tencent | Win32.Trojan-dropper.Injector.Fhy |
Sophos | Mal/Generic-S |
Comodo | Malware@#2yfoh207ssq0s |
F-Secure | Trojan.TR/Downloader.Gen2 |
Zillya | Dropper.Injector.Win32.79160 |
McAfee-GW-Edition | Artemis!Trojan |
FireEye | Gen:Variant.Fugrafa.79578 |
Emsisoft | Gen:Variant.Fugrafa.79578 (B) |
Ikarus | Trojan.Win64.Fleercivet |
GData | Win32.Trojan.Fleercivet.B |
Avira | TR/Downloader.Gen2 |
Antiy-AVL | Trojan[Dropper]/Win32.Injector |
Arcabit | Trojan.Fugrafa.D136DA |
ZoneAlarm | Trojan.Win32.Bublik.fbew |
Microsoft | Trojan:Win32/Fleercivet!rfn |
Cynet | Malicious (score: 85) |
AhnLab-V3 | Dropper/Win32.Injector.C1614715 |
VBA32 | Trojan.Bublik |
ALYac | Gen:Variant.Fugrafa.79578 |
MAX | malware (ai score=99) |
Malwarebytes | Malware.AI.3810930311 |
ESET-NOD32 | a variant of Win32/Fleercivet.AG |
Rising | Trojan.Vigorf!8.EAEA (TFE:2:pFD77tIJfsT) |
Yandex | Trojan.Fleercivet!IG5/Zi8Blb8 |
eGambit | Unsafe.AI_Score_82% |
Fortinet | W32/Generic.AC.390B11!tr |
AVG | Win64:Malware-gen |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_60% (W) |
Qihoo-360 | Win32/Trojan.Dropper.06c |
Domains that associated with Fleercivet:
0 | www.ip-api.com |
1 | www.gstatic.com |
What are the symptoms of Fleercivet trojan?
- Executable code extraction;
- Injection with CreateRemoteThread in a remote process;
- Creates RWX memory;
- Attempts to connect to a dead IP:Port (7 unique times);
- Expresses interest in specific running processes;
- Repeatedly searches for a not-found process, may want to run with startbrowser=1 option;
- Reads data out of its own binary image;
- Drops a binary and executes it;
- HTTP traffic contains suspicious features which may be indicative of malware related traffic;
- Performs some HTTP requests;
- Uses Windows utilities for basic functionality;
- Queries information on disks for anti-virtualization via Device Information APIs;
- Code injection with CreateRemoteThread in a remote process;
- A process attempted to delay the analysis task by a long amount of time.;
- Steals private information from local Internet browsers;
- Installs itself for autorun at Windows startup;
- Creates a hidden or system file;
- Creates Zeus (Banking Trojan) mutexes;
The common sign of the Fleercivet trojan virus is a gradual appearance of different malware – adware, browser hijackers, and so on. As a result of the activity of these malicious programs, your personal computer comes to be very sluggish: malware uses up large amounts of RAM and CPU capabilities.
One more visible result of the Fleercivet trojan virus visibility is unidentified operations showed in task manager. Sometimes, these processes may attempt to mimic system processes, however, you can recognize that they are not legit by looking at the origin of these processes. Pseudo system applications and Fleercivet trojan’s processes are always specified as a user’s programs, not as a system’s.
How to remove Fleercivet trojan virus?
- Download and install Loaris Trojan Remover.
- Open Loaris and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Approve the reset pressing “Yes” button in the appeared window.
- Restart your computer.
To delete Fleercivet trojan and ensure that all satellite malware, downloaded with the help of this trojan, will certainly be removed, too, I’d recommend you to use Loaris Trojan Remover.
Fleercivet removal guide
To spot and delete all malicious programs on your computer using Loaris, it’s better to use Standard or Full scan. Removable scan, as well as Custom, will scan only specified folders, so such scans are not able to provide the full information.
You can spectate the detects till the scan process lasts. However, to perform any actions against spotted malware, you need to wait until the process is over, or to interrupt the scanning process.
To designate the specific action for each detected malware, choose the knob in front of the name of detected viruses. By default, all malware will be sent to quarantine.
How to remove Fleercivet Trojan?
Name: Fleercivet
Description: Trojan Fleercivet is a kind of virus that infiltrates into your computer, and after that performs different destructive functions. These features depend upon a type of Fleercivet trojan: it can act as a downloader for many other malware or as a launcher for another destructive program which is downloaded in addition to the Fleercivet trojan. During the last two years, trojans are also dispersed via e-mail attachments, and most of situations utilized for phishing or ransomware infiltration.
Operating System: Windows
Application Category: Trojan