In this post, I am going to clarify how the Tearspear trojan injected into your computer, as well as how to remove Tearspear trojan virus.
What is Tearspear trojan?
Name | Tearspear |
Infection Type | Trojan |
Symptoms |
|
Similar behavior | Lethic, Sennoma, GenKryptik, Genmaldow, MereTam, Toauta |
Fix Tool | See If Your System Has Been Affected by Tearspear trojan |
Trojan viruses are among the leading malware kinds by its injection rate for quite a long time. And now, during the pandemic, when malware got enormously active, trojan viruses boosted their activity, too. You can see a number of messages on different sources, where users are grumbling about the Tearspear trojan virus in their computers, as well as asking for aid with Tearspear trojan virus clearing.
Trojan Tearspear is a kind of virus that infiltrates into your computer, and afterwards performs a wide range of harmful functions. These features depend upon a sort of Tearspear trojan: it may work as a downloader for many other malware or as a launcher for an additional harmful program which is downloaded together with the Tearspear trojan virus. During the last 2 years, trojans are also spread with email attachments, and in the majority of instances used for phishing or ransomware injection.
Tearspear2 also known as
Bkav | W32.AIDetectVM.malware2 |
Elastic | malicious (high confidence) |
ClamAV | Win.Downloader.13403-1 |
McAfee | Generic.boq |
Malwarebytes | Generic.Malware/Suspicious |
AegisLab | Trojan.Win32.Genome.a!c |
Sangfor | Malware |
K7AntiVirus | Riskware ( 0040eff71 ) |
BitDefender | Trojan.Generic.3126910 |
K7GW | Riskware ( 0040eff71 ) |
Cybereason | malicious.671773 |
Arcabit | Trojan.Generic.D2FB67E |
Cyren | W32/Risk.ELIB-4566 |
Symantec | ML.Attribute.HighConfidence |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | Trojan-Downloader.Win32.Genome.aghv |
Alibaba | TrojanDownloader:Win32/Genome.8c64d780 |
NANO-Antivirus | Trojan.Win32.TrjGen.dwpnbc |
MicroWorld-eScan | Trojan.Generic.3126910 |
Tencent | Win32.Trojan-downloader.Genome.Lpbi |
Ad-Aware | Trojan.Generic.3126910 |
Emsisoft | Trojan.Generic.3126910 (B) |
Comodo | Malware@#fte5pl87otpm |
DrWeb | Trojan.DownLoader11.13418 |
Zillya | Downloader.Genome.Win32.70542 |
McAfee-GW-Edition | BehavesLike.Win32.Infected.bh |
FireEye | Generic.mg.aaa6468671773a8d |
Sophos | Mal/Generic-R + Mal/Banker-AE |
Ikarus | Trojan.SuspectCRC |
Jiangmin | TrojanDownloader.Genome.yqg |
Webroot | W32.Trojan-downloader.Win32.Gen |
MAX | malware (ai score=100) |
Antiy-AVL | Trojan[Downloader]/Win32.Genome |
Kingsoft | Win32.TrojDownloader.Genome.ag.(kcloud) |
Microsoft | TrojanDownloader:Win32/Tearspear!gmb |
ZoneAlarm | Trojan-Downloader.Win32.Genome.aghv |
GData | Trojan.Generic.3126910 |
ALYac | Trojan.Generic.3126910 |
VBA32 | BScope.TrojanDownloader.Banload |
Cylance | Unsafe |
Panda | Trj/CI.A |
ESET-NOD32 | a variant of Generik.NFKPQHY |
Rising | Downloader.Banload!8.15B (TFE:3:OkdK8kF4PjK) |
Yandex | Trojan.DL.Genome!qtujNp3wbl4 |
MaxSecure | Trojan.Malware.927344.susgen |
Fortinet | W32/Genome.AGHV!tr.dldr |
BitDefenderTheta | Gen:NN.ZelphiF.34804.TKW@aCG9frUO |
AVG | Win32:Trojan-gen |
Avast | Win32:Trojan-gen |
CrowdStrike | win/malicious_confidence_60% (W) |
Qihoo-360 | Win32/Trojan.Downloader.2ac |
Domains that associated with Tearspear:
0 | z.whorecord.xyz |
1 | a.tomx.xyz |
2 | www.rdscanada.ca |
3 | www.treewhispers.com |
4 | apps.identrust.com |
5 | crl.identrust.com |
6 | r3.o.lencr.org |
7 | www.koja-lindlar.de |
8 | www.facebook.com |
9 | ocsp.digicert.com |
What are the symptoms of Tearspear trojan?
- Executable code extraction;
- Creates RWX memory;
- A process attempted to delay the analysis task.;
- Attempts to connect to a dead IP:Port (11 unique times);
- A process created a hidden window;
- Performs some HTTP requests;
- Unconventionial language used in binary resources: Spanish (Modern);
- Checks for the presence of known windows from debuggers and forensic tools;
- Attempts to execute a binary from a dead or sinkholed URL;
- Installs itself for autorun at Windows startup;
- Creates a hidden or system file;
- Detects VirtualBox through the presence of a registry key;
- Attempts to modify proxy settings;
The typical indicator of the Tearspear trojan virus is a progressive appearance of different malware – adware, browser hijackers, and so on. Because of the activity of these harmful programs, your system ends up being really slow: malware utilizes substantial amounts of RAM and CPU abilities.
Another detectable result of the Tearspear trojan virus existence is unfamiliar operations displayed in task manager. In some cases, these processes might attempt to imitate system processes, but you can recognize that they are not legit by looking at the source of these tasks. Quasi system applications and Tearspear trojan’s processes are always detailed as a user’s tasks, not as a system’s.
How to remove Tearspear trojan virus?
- Download and install Loaris Trojan Remover.
- Open Loaris and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Approve the reset pressing “Yes” button in the appeared window.
- Restart your computer.
To get rid of Tearspear trojan and ensure that all extra malware, downloaded with the help of this trojan, will certainly be wiped out, too, I’d advise you to use Loaris Trojan Remover.
Tearspear removal guide
To detect and remove all malicious items on your computer using Loaris Trojan Remover, it’s better to use Standard or Full scan. Removable scan, as well as Custom, will check only specified locations, so these checks are not able to provide the full information.
You can spectate the detects during the scan process goes. Nevertheless, to perform any actions against spotted malware, you need to wait until the scan is over, or to interrupt the scan.
To designate the specific action for each detected malware, choose the arrow in front of the name of detected malicious programs. By default, all malicious programs will be sent to quarantine.
How to remove Tearspear Trojan?
Name: Tearspear
Description: Trojan Tearspear is a kind of virus that infiltrates into your computer, and after that performs different destructive functions. These features depend upon a type of Tearspear trojan: it can act as a downloader for many other malware or as a launcher for another destructive program which is downloaded in addition to the Tearspear trojan. During the last two years, trojans are also dispersed via e-mail attachments, and most of situations utilized for phishing or ransomware infiltration.
Operating System: Windows
Application Category: Trojan