In this article, I am going to describe the way the Graftor trojan injected into your computer, and also how to clear away Graftor trojan virus.
What is Graftor trojan?
Name | Graftor |
Infection Type | Trojan |
Symptoms |
|
Similar behavior | Sfone, Napolar, Mofksys, Kagee, Ousetuu, Laziok |
Fix Tool | See If Your System Has Been Affected by Graftor trojan |
Trojan viruses are among the leading malware types by its injection frequency for quite a very long time. And now, throughout the pandemic, when malware became tremendously active, trojan viruses boosted their activity, too. You can see a number of messages on various sources, where users are whining about the Graftor trojan virus in their computer systems, as well as requesting aid with Graftor trojan virus elimination.
Trojan Graftor is a sort of virus that injects into your personal computer, and after that performs different destructive functions. These features rely on a sort of Graftor trojan: it can act as a downloader for other malware or as a launcher for another malicious program which is downloaded together with the Graftor trojan. Throughout the last 2 years, trojans are also delivered via e-mail attachments, and most of cases used for phishing or ransomware injection.
Graftor2 also known as
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Graftor.4!c |
MicroWorld-eScan | Gen:Variant.Application.Graftor.750661 |
ClamAV | Win.Malware.Generic-9954271-0 |
FireEye | Generic.mg.e89a811632e86297 |
ALYac | Gen:Variant.Application.Graftor.750661 |
Cylance | unsafe |
Zillya | Trojan.Asprotect.Win32.1 |
Sangfor | Suspicious.Win32.Save.ins |
CrowdStrike | win/malicious_confidence_100% (W) |
Alibaba | Packed:Win32/Asprotect.c7edaea9 |
K7GW | Trojan ( 00542f551 ) |
K7AntiVirus | Trojan ( 00542f551 ) |
BitDefenderTheta | Gen:NN.ZexaF.36350.@RZaa4faPRnb |
VirIT | Trojan.Win32.Genus.RSS |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Packed.Asprotect.HX |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | UDS:Trojan.Win32.Agent.xbcswp |
BitDefender | Gen:Variant.Application.Graftor.750661 |
Avast | Win32:TrojanX-gen [Trj] |
Tencent | Win32.Trojan.Agen.Lajl |
Emsisoft | Gen:Variant.Application.Graftor.750661 (B) |
F-Secure | Heuristic.HEUR/AGEN.1350240 |
VIPRE | Gen:Variant.Application.Graftor.750661 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.rc |
Sophos | Mal/Generic-S |
SentinelOne | Static AI – Suspicious PE |
GData | Gen:Variant.Application.Graftor.750661 |
Avira | HEUR/AGEN.1350240 |
Antiy-AVL | Trojan[Packed]/Win32.Asprotect |
Arcabit | Trojan.Application.Graftor.DB7445 |
ZoneAlarm | UDS:Trojan.Win32.Agent.xbcswp |
Microsoft | Trojan:Win32/Graftor.GNZ!MTB |
Detected | |
AhnLab-V3 | Trojan/Win.Generic.R589938 |
Acronis | suspicious |
McAfee | Artemis!E89A811632E8 |
MAX | malware (ai score=79) |
VBA32 | TScope.Malware-Cryptor.SB |
Malwarebytes | Generic.Malware.AI.DDS |
TrendMicro-HouseCall | TROJ_GEN.R002H01HP23 |
Rising | Trojan.Graftor!8.E41A (CLOUD) |
Yandex | Trojan.GenAsa!XHPWPUxbPWE |
Ikarus | Trojan.Win32.ASProtect |
MaxSecure | Trojan.Malware.300983.susgen |
AVG | Win32:TrojanX-gen [Trj] |
Cybereason | malicious.632e86 |
DeepInstinct | MALICIOUS |
What are the symptoms of Graftor trojan?
- Behavioural detection: Executable code extraction – unpacking;
- Sample contains Overlay data;
- CAPE extracted potentially suspicious content;
- Unconventionial language used in binary resources: Chinese (Simplified);
- The binary contains an unknown PE section name indicative of packing;
- The binary likely contains encrypted or compressed data.;
- Authenticode signature is invalid;
- Checks the presence of disk drives in the registry, possibly for anti-virtualization;
- Yara rule detections observed from a process memory dump/dropped files/CAPE;
The typical indicator of the Graftor trojan virus is a progressive entrance of various malware – adware, browser hijackers, et cetera. As a result of the activity of these harmful programs, your system becomes extremely slow: malware uses up substantial quantities of RAM and CPU abilities.
One more visible impact of the Graftor trojan virus visibility is unfamiliar processes showed off in task manager. Sometimes, these processes may attempt to imitate system processes, however, you can understand that they are not legit by looking at the genesis of these processes. Pseudo system applications and Graftor trojan’s processes are always listed as a user’s processes, not as a system’s.
How to remove Graftor trojan virus?
- Download and install Loaris Trojan Remover.
- Open Loaris and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Approve the reset pressing “Yes” button in the appeared window.
- Restart your computer.
To get rid of Graftor trojan and ensure that all additional malware, downloaded with the help of this trojan, will certainly be eliminated, as well, I’d suggest you to use Loaris Trojan Remover.
Graftor removal guide
To detect and remove all malware on your personal computer using Loaris, it’s better to make use of Standard or Full scan. Removable scan, as well as Custom, will scan only specified folders, so these types of scans are not able to provide the full information.
You can observe the detects during the scan process lasts. However, to perform any actions against detected malware, you need to wait until the process is over, or to stop the scan.
To choose the special action for each detected malicious programs, choose the button in front of the detection name of detected malware. By default, all malicious programs will be moved to quarantine.
How to remove Graftor Trojan?
Name: Graftor
Description: Trojan Graftor is a kind of virus that infiltrates into your computer, and after that performs different destructive functions. These features depend upon a type of Graftor trojan: it can act as a downloader for many other malware or as a launcher for another destructive program which is downloaded in addition to the Graftor trojan. During the last two years, trojans are also dispersed via e-mail attachments, and most of situations utilized for phishing or ransomware infiltration.
Operating System: Windows
Application Category: Trojan
User Review
( votes)- What is Trojan Horse: https://en.wikipedia.org/wiki/Trojan_horse_(computing)
- Graftor VirusTotal Report: https://www.virustotal.com/api/v3/files/8765af88d63324ae3901b1eae825b78d1206f4eabfc9faa0684bd0f821915ca1