In this article, I am going to describe the way the Guag trojan infused right into your system, as well as how to remove Guag trojan virus.
What is Guag trojan?
Name | Guag |
Infection Type | Trojan |
Symptoms |
|
Similar behavior | BlueTraveller, Zoxpng, Pyramid, Daserf, MagicHound, PowerSpritz |
Fix Tool | See If Your System Has Been Affected by Guag trojan |
Trojan viruses are among the leading malware types by its injection rate for quite a very long time. And currently, throughout the pandemic, when malware became enormously active, trojan viruses increased their activity, too. You can see a number of messages on different sources, where people are complaining concerning the Guag trojan virus in their computer systems, and requesting help with Guag trojan virus elimination.
Trojan Guag is a type of virus that injects into your PC, and after that executes various harmful features. These features depend on a kind of Guag trojan: it may function as a downloader for many other malware or as a launcher for another harmful program which is downloaded along with the Guag trojan virus. Throughout the last two years, trojans are also dispersed with e-mail attachments, and in the majority of instances used for phishing or ransomware infiltration.
Guag2 also known as
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Win32.Guag.4!c |
tehtris | Generic.Malware |
MicroWorld-eScan | Gen:Variant.Zusy.429537 |
ClamAV | Win.Trojan.Agent-542983 |
FireEye | Generic.mg.430a2c87037f6804 |
CAT-QuickHeal | Trojan.VB.Gen |
ALYac | Gen:Variant.Zusy.429537 |
Cylance | Unsafe |
Zillya | Trojan.VB.Win32.61192 |
K7AntiVirus | Trojan ( 0009dcb61 ) |
K7GW | Trojan ( 0009dcb61 ) |
Cybereason | malicious.7037f6 |
Baidu | Win32.Trojan-Clicker.VB.b |
VirIT | Trojan.Win32.VB.BAYX |
Cyren | W32/VB.IY.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/VB.PNU |
APEX | Malicious |
Paloalto | generic.ml |
Cynet | Malicious (score: 99) |
Kaspersky | Trojan.Win32.Guag.aqe |
BitDefender | Gen:Variant.Zusy.429537 |
NANO-Antivirus | Trojan.Win32.Clicker.cojaft |
SUPERAntiSpyware | Trojan.Agent/Gen-Dropper |
Avast | Win32:Trojan-gen |
Tencent | Malware.Win32.Gencirc.10c2df51 |
Ad-Aware | Gen:Variant.Zusy.429537 |
TACHYON | Trojan/W32.VB-Guag.24640 |
Emsisoft | Gen:Variant.Zusy.429537 (B) |
Comodo | TrojWare.Win32.VB.PNU@4rjep0 |
DrWeb | Trojan.Click2.2650 |
VIPRE | Gen:Variant.Zusy.429537 |
TrendMicro | TSPY_VBKRYPT_CA0803D9.TOMC |
McAfee-GW-Edition | BehavesLike.Win32.Trojan.mz |
Trapmine | malicious.moderate.ml.score |
Sophos | Mal/Generic-S |
SentinelOne | Static AI – Malicious PE |
GData | Gen:Variant.Zusy.429537 |
Jiangmin | Trojan/Generic.atgam |
Webroot | W32.Worm.Gen |
Avira | TR/Dropper.Gen5 |
Antiy-AVL | Trojan/Generic.ASMalwS.5B7 |
Arcabit | Trojan.Zusy.D68DE1 |
Microsoft | Trojan:Win32/Wacatac.B!ml |
Detected | |
AhnLab-V3 | Dropper/Win32.VB.R23190 |
Acronis | suspicious |
McAfee | Artemis!430A2C87037F |
MAX | malware (ai score=80) |
VBA32 | Trojan.Guag |
Malwarebytes | Malware.AI.3300652915 |
TrendMicro-HouseCall | TSPY_VBKRYPT_CA0803D9.TOMC |
Rising | Trojan.Win32.VBCode.bxf (CLASSIC) |
Yandex | Trojan.GenAsa!X8I7RR167UM |
Ikarus | Trojan-Clicker.Win32.VB |
MaxSecure | Trojan.Malware.7092396.susgen |
Fortinet | W32/VB.PNU!tr |
BitDefenderTheta | Gen:NN.ZevbaF.34646.bm1@a0mtxPjb |
AVG | Win32:Trojan-gen |
Panda | Trj/Genetic.gen |
CrowdStrike | win/malicious_confidence_90% (W) |
What are the symptoms of Guag trojan?
- Behavioural detection: Executable code extraction – unpacking;
- Sample contains Overlay data;
- Performs HTTP requests potentially not found in PCAP.;
- Reads data out of its own binary image;
- Unconventionial binary language: Chinese (Simplified);
- Unconventionial language used in binary resources: Chinese (Simplified);
- Authenticode signature is invalid;
- Uses Windows utilities for basic functionality;
- Behavioural detection: Injection (inter-process);
- Attempts to modify proxy settings;
- Harvests cookies for information gathering;
- Anomalous binary characteristics;
The frequent indicator of the Guag trojan virus is a progressive entrance of various malware – adware, browser hijackers, et cetera. Because of the activity of these malicious programs, your PC becomes very slow: malware utilizes big quantities of RAM and CPU capabilities.
One more noticeable result of the Guag trojan virus visibility is unknown operations showed off in task manager. Often, these processes might attempt to mimic system processes, however, you can understand that they are not legit by looking at the genesis of these tasks. Quasi system applications and Guag trojan’s processes are always specified as a user’s programs, not as a system’s.
How to remove Guag trojan virus?
- Download and install Loaris Trojan Remover.
- Open Loaris and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Approve the reset pressing “Yes” button in the appeared window.
- Restart your computer.
To get rid of Guag trojan and also be sure that all additional malware, downloaded with the help of this trojan, will certainly be wiped out, too, I’d recommend you to use Loaris Trojan Remover.
Guag removal guide
To spot and delete all malicious items on your personal computer using Loaris, it’s better to utilize Standard or Full scan. Removable scan, as well as Custom, will check only specified folders, so these checks are not able to provide the full information.
You can see the detects during the scan process goes. Nonetheless, to perform any actions against detected malware, you need to wait until the scan is finished, or to interrupt the scan.
To choose the special action for each detected malware, click the button in front of the name of detected malicious items. By default, all viruses will be sent to quarantine.
How to remove Guag Trojan?
Name: Guag
Description: Trojan Guag is a kind of virus that infiltrates into your computer, and after that performs different destructive functions. These features depend upon a type of Guag trojan: it can act as a downloader for many other malware or as a launcher for another destructive program which is downloaded in addition to the Guag trojan. During the last two years, trojans are also dispersed via e-mail attachments, and most of situations utilized for phishing or ransomware infiltration.
Operating System: Windows
Application Category: Trojan
User Review
( votes)- What is Trojan Horse: https://en.wikipedia.org/wiki/Trojan_horse_(computing)
- Guag VirusTotal Report: https://www.virustotal.com/api/v3/files/6dac9b65986ee164e4959e143b53115e616692ee6e9ec5a85b171856e72461b4