In this post, I am going to explain how the Ketrican trojan injected right into your PC, and the best way to remove Ketrican trojan virus.
What is Ketrican trojan?
Name | Ketrican |
Infection Type | Trojan |
Symptoms |
|
Similar behavior | NanoCore, ExeDot, RevengeRAT, Bohojan, Exrand, Faikdal |
Fix Tool | See If Your System Has Been Affected by Ketrican trojan |
Trojan viruses are one of the leading malware types by its injection frequency for quite a very long time. And now, during the pandemic, when malware became immensely active, trojan viruses increased their activity, too. You can see lots of messages on various sources, where people are grumbling concerning the Ketrican trojan virus in their computer systems, and also requesting assisting with Ketrican trojan virus clearing.
Trojan Ketrican is a type of virus that infiltrates right into your system, and after that performs various malicious functions. These features depend on a type of Ketrican trojan: it may work as a downloader for additional malware or as a launcher for another destructive program which is downloaded together with the Ketrican trojan virus. Over the last 2 years, trojans are additionally dispersed using email add-ons, and most of cases utilized for phishing or ransomware infiltration.
Ketrican2 also known as
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Generic.4!c |
MicroWorld-eScan | Gen:Variant.Zusy.473843 |
CAT-QuickHeal | Backdoor.Ketrican.S30472149 |
McAfee | RDN/Real Protect-LS |
Malwarebytes | Malware.AI.2551736388 |
VIPRE | Gen:Variant.Zusy.473843 |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 005a77b51 ) |
Alibaba | Trojan:Win32/Protect.0f4a6753 |
K7GW | Trojan ( 005a77b51 ) |
Cybereason | malicious.0522a0 |
VirIT | Trojan.Win32.Genus.RNF |
Cyren | W32/ABRisk.BYCD-6629 |
Symantec | Backdoor.Graphican |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Graphican.A |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | HEUR:Trojan.Win32.Generic |
BitDefender | Gen:Variant.Zusy.473843 |
Avast | Win32:Malware-gen |
Tencent | Win32.Trojan.Generic.Jflw |
Emsisoft | Gen:Variant.Zusy.473843 (B) |
F-Secure | Trojan.TR/Agent.amwag |
DrWeb | BackDoor.Siggen2.4520 |
Zillya | Trojan.Generic.Win32.1761059 |
TrendMicro | Backdoor.Win32.GRAPHICAN.THFBFBC |
McAfee-GW-Edition | BehavesLike.Win32.Generic.ch |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.cc8882dfd58b69cb |
Sophos | Mal/Generic-S |
SentinelOne | Static AI – Suspicious PE |
GData | Gen:Variant.Zusy.473843 |
Webroot | W32.Backdoor.Graphican |
Avira | TR/Agent.amwag |
Antiy-AVL | Trojan/Win32.Generic |
Xcitium | Malware@#3fgj5y333e18b |
Arcabit | Trojan.Zusy.D73AF3 |
ZoneAlarm | HEUR:Trojan.Win32.Generic |
Microsoft | Trojan:Win32/Ketrican!ic |
Detected | |
AhnLab-V3 | Trojan/Win.RealProtect-LS.C5332482 |
VBA32 | Trojan.Real |
ALYac | Backdoor.Agent.Graphican |
MAX | malware (ai score=85) |
Cylance | unsafe |
Panda | Trj/Agent.TV |
TrendMicro-HouseCall | Backdoor.Win32.GRAPHICAN.THFBFBC |
Rising | Trojan.Generic@AI.100 (RDML:pj3vj/AoV45y6piqEbhcCA) |
Ikarus | Backdoor.Graphican |
MaxSecure | Trojan.Malware.7164915.susgen |
Fortinet | W32/Graphican.A!tr |
BitDefenderTheta | Gen:NN.ZexaF.36318.iqW@auFxuyo |
AVG | Win32:Malware-gen |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |
What are the symptoms of Ketrican trojan?
- Uses Windows utilities for basic functionality;
- Authenticode signature is invalid;
- Detects Bochs through the presence of a registry key;
- Checks the version of Bios, possibly for anti-virtualization;
- Attempted to write directly to a physical drive;
- Attempts to modify proxy settings;
- Touches a file containing cookies, possibly for information gathering;
- Collects information to fingerprint the system;
- Uses suspicious command line tools or Windows utilities;
The frequent symptom of the Ketrican trojan virus is a progressive entrance of a wide range of malware – adware, browser hijackers, et cetera. As a result of the activity of these harmful programs, your computer becomes very lagging: malware uses up large quantities of RAM and CPU capacities.
Another detectable result of the Ketrican trojan virus presence is unfamiliar programs showed in task manager. Sometimes, these processes may attempt to mimic system processes, however, you can recognize that they are not legit by taking a look at the source of these tasks. Pseudo system applications and Ketrican trojan’s processes are always specified as a user’s programs, not as a system’s.
How to remove Ketrican trojan virus?
- Download and install Loaris Trojan Remover.
- Open Loaris and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Approve the reset pressing “Yes” button in the appeared window.
- Restart your computer.
To remove Ketrican trojan and be sure that all additional malware, downloaded with the help of this trojan, will certainly be deleted, as well, I’d recommend you to use Loaris Trojan Remover.
Ketrican removal guide
To detect and eliminate all malicious programs on your computer using Loaris Trojan Remover, it’s better to utilize Standard or Full scan. Removable scan, as well as Custom, will scan only specified folders, so these scans are not able to provide the full information.
You can observe the detects till the scan process lasts. Nevertheless, to execute any actions against detected malicious items, you need to wait until the scan is finished, or to stop the scanning process.
To designate the special action for each detected malicious programs, choose the knob in front of the detection name of detected malicious programs. By default, all malicious items will be sent to quarantine.
How to remove Ketrican Trojan?
Name: Ketrican
Description: Trojan Ketrican is a kind of virus that infiltrates into your computer, and after that performs different destructive functions. These features depend upon a type of Ketrican trojan: it can act as a downloader for many other malware or as a launcher for another destructive program which is downloaded in addition to the Ketrican trojan. During the last two years, trojans are also dispersed via e-mail attachments, and most of situations utilized for phishing or ransomware infiltration.
Operating System: Windows
Application Category: Trojan
User Review
( votes)- What is Trojan Horse: https://en.wikipedia.org/wiki/Trojan_horse_(computing)
- Ketrican VirusTotal Report: https://www.virustotal.com/api/v3/files/a78cc475c1875186dcd1908b55c2eeaf1bcd59dedaff920f262f12a3a9e9bfa8