In this post, I am going to explain the way the Obfuscated trojan infused into your personal computer, as well as the best way to delete Obfuscated trojan virus.
What is Obfuscated trojan?
Name | Obfuscated |
Infection Type | Trojan |
Symptoms |
|
Similar behavior | Witproc, Ligzoc, Togapy, Xtrat, Pher, Gobundaz |
Fix Tool | See If Your System Has Been Affected by Obfuscated trojan |
Trojan viruses are among the leading malware kinds by its injection frequency for quite a very long time. And now, during the pandemic, when malware became extremely active, trojan viruses raised their activity, too. You can see plenty of messages on different websites, where people are grumbling concerning the Obfuscated trojan virus in their computer systems, and also requesting for assisting with Obfuscated trojan virus clearing.
Trojan Obfuscated is a kind of virus that infiltrates right into your system, and afterwards performs a wide range of destructive features. These functions depend upon a kind of Obfuscated trojan: it may work as a downloader for other malware or as a launcher for another harmful program which is downloaded in addition to the Obfuscated trojan. Over the last 2 years, trojans are additionally spread via email attachments, and in the majority of cases used for phishing or ransomware infiltration.
Obfuscated2 also known as
Bkav | W32.AIDetectVM.malware1 |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.Swizzor.Gen.3 |
FireEye | Generic.mg.aff179a53f5a5a75 |
McAfee | Swizzor.gen.a |
Cylance | Unsafe |
VIPRE | Trojan.Win32.Swizzor.Gen (v) |
Sangfor | Malware |
K7AntiVirus | Trojan ( f10003021 ) |
BitDefender | Trojan.Swizzor.Gen.3 |
K7GW | Trojan ( f10003021 ) |
Cybereason | malicious.53f5a5 |
Cyren | W32/Swizzor.D!Generic |
Symantec | ML.Attribute.HighConfidence |
TotalDefense | Win32/Swizzor!generic |
APEX | Malicious |
Avast | Win32:Swizzor |
Kaspersky | Trojan.Win32.Obfuscated.gen |
NANO-Antivirus | Virus.Win32.Gen.ccmw |
Rising | [email protected] (RDML:cgJ8qJUz/dMrASp6VBnnNQ) |
Ad-Aware | Trojan.Swizzor.Gen.3 |
Emsisoft | Trojan.Swizzor.Gen.3 (B) |
Comodo | TrojWare.Win32.TrojanDownloader.Swizzor.Gen@1fy3o0 |
F-Secure | Trojan.TR/Dldr.Swizzor.Gen |
DrWeb | Trojan.Swizzor.based |
Zillya | Trojan.Swizzor.Win32.204384 |
TrendMicro | Mal_Swizzor |
McAfee-GW-Edition | BehavesLike.Win32.Swizzor.gc |
Sophos | ML/PE-A + Mal/Swizzor-B |
SentinelOne | Static AI – Malicious PE |
Jiangmin | Trojan/Obfuscated.Gen |
Avira | TR/Dldr.Swizzor.Gen |
MAX | malware (ai score=80) |
Antiy-AVL | Trojan/Win32.Swizzor |
Microsoft | Trojan:Win32/C2Lop.gen!H |
Arcabit | Trojan.Swizzor.Gen.3 |
ZoneAlarm | Trojan.Win32.Obfuscated.gen |
GData | Trojan.Swizzor.Gen.3 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Win-Trojan/Swizzor.Gen |
Acronis | suspicious |
BitDefenderTheta | AI:Packer.A29C15EB20 |
VBA32 | Trojan.Win32.Drivecurb.3 |
Panda | Trj/Swizzor.gen |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Swizzor.NFR |
TrendMicro-HouseCall | Mal_Swizzor |
Yandex | Trojan.DL.Swizzor!1uNKRBThViY |
Ikarus | Trojan.Win32.Obfuscated |
Fortinet | W32/Swizzor.fam!tr |
AVG | Win32:Swizzor |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_60% (D) |
Qihoo-360 | Malware.Radar01.Gen |
Domains that associated with Obfuscated:
0 | upd.host-domain-lookup.com |
What are the symptoms of Obfuscated trojan?
- Executable code extraction;
- Injection (inter-process);
- Injection with CreateRemoteThread in a remote process;
- Attempts to connect to a dead IP:Port (1 unique times);
- Creates RWX memory;
- Possible date expiration check, exits too soon after checking local time;
- Reads data out of its own binary image;
- Performs some HTTP requests;
- The binary likely contains encrypted or compressed data.;
- Checks for the presence of known windows from debuggers and forensic tools;
- Attempts to execute a binary from a dead or sinkholed URL;
- Installs itself for autorun at Windows startup;
- Creates a hidden or system file;
- Detects VirtualBox through the presence of a registry key;
- Attempts to modify proxy settings;
- Anomalous binary characteristics;
The frequent sign of the Obfuscated trojan virus is a steady appearance of a wide range of malware – adware, browser hijackers, and so on. Because of the activity of these malicious programs, your personal computer ends up being very slow: malware uses up big quantities of RAM and CPU capacities.
One more visible impact of the Obfuscated trojan virus existence is unidentified operations showed off in task manager. Sometimes, these processes may attempt to simulate system processes, but you can recognize that they are not legit by checking out the source of these tasks. Quasi system applications and Obfuscated trojan’s processes are always specified as a user’s programs, not as a system’s.
How to remove Obfuscated trojan virus?
- Download and install Loaris Trojan Remover.
- Open Loaris and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Approve the reset pressing “Yes” button in the appeared window.
- Restart your computer.
To eliminate Obfuscated trojan and also ensure that all additional malware, downloaded with the help of this trojan, will be eliminated, too, I’d advise you to use Loaris Trojan Remover.
Obfuscated removal guide
To detect and eliminate all malicious programs on your personal computer using Loaris, it’s better to utilize Standard or Full scan. Removable scan, as well as Custom, will check only specified directories, so such checks are not able to provide the full information.
You can spectate the detects during the scan process lasts. Nevertheless, to perform any actions against detected malicious programs, you need to wait until the scan is over, or to interrupt the scan.
To choose the specific action for each detected malicious items, click the button in front of the detection name of detected viruses. By default, all malicious items will be sent to quarantine.
How to remove Obfuscated Trojan?
Name: Obfuscated
Description: Trojan Obfuscated is a kind of virus that infiltrates into your computer, and after that performs different destructive functions. These features depend upon a type of Obfuscated trojan: it can act as a downloader for many other malware or as a launcher for another destructive program which is downloaded in addition to the Obfuscated trojan. During the last two years, trojans are also dispersed via e-mail attachments, and most of situations utilized for phishing or ransomware infiltration.
Operating System: Windows
Application Category: Trojan