This manual describes how to remove a trojan I came across on someone else's machine.
The trojan seems to contain a crypto miner, and spreads through infecting USB sticks.
Here are hashes of the trojan's main files:
svctrl64.exe:
- md5:
b88b2c61844a49fcc54727105ae9abac - sha256:
c946fab611d49b224d1f6ecee63f02bdfcfb017b860ca1f8361546f5d2c77daa
uXXXXXX.dll, where XXXXXX are six random numbers, e.g. u148375.dll:
- md5:
1cf4a8bfd59d5f04be313d2fa3af5f5a - sha256:
e93823b3cc234511c49ffde8169794600417c59e0a3340c5407cc57b71bdb378
- Download the
Autorunsprogram from the Microsoft website (search forautoruns download site:microsoft.com). This program allows you to inspect which software is started when you turn on your PC. - Extract the .zip, and run the
Autoruns64program as an administrator. - After the program has loaded, scroll down the list. There will be a few lines with a red background. Two of them will be called
\svctrl64anduXXXXXX. Right-click on them and selectDelete.
Delete the following files:
C:\Windows\System32\uXXXXXX.dllC:\Windows\System32\svctrl64.exe
If you have an infected USB stick, also delete these files:
X:\sysvolume\- The malicious
.lnkfile
Restart your computer, and open the Autoruns64 program again as an administrator. Check that the \svctrl64 and uXXXXXX entries you deleted have not come back.
If they have come back, repeat the previous steps.
To avoid detection, the virus added the following folders to Microsoft Defender's exclusion list:
C:\Windows \System32C:\Windows\System32X:\sysvolume\
Open the Windows Security application, and navigate to Virus & threat protection -> Virus & threar protection settings -> Manage settings -> Exclusions -> Add or remove exclusions.
Click on each excluded path and remove it.
Reboot the machine.
Open the Windows Security application, and navigate to Virus & threat protection -> Scan options.
Perform a Microsoft Defender Offline scan if possible. Alternatively, perform a Full scan.
The following information can be used to detect infected computers / USB sticks.
The following files exist:
C:\Windows\System32\uXXXXXX.dllC:\Windows\System32\svctrl64.exe
- There is a hidden folder
X:\sysvolume\, which is only accessible by directly typing its path. - There is a malicious
.lnkfile which points to a script inside thesysvolumefolder. The.lnkhas the same name as a folder on the USB stick. (For example, if there is aX:\test\folder, the link is namedX:\test.lnk, and the original folder is hidden.)
Crypto miner found in Greece last Monday (November 24, 2024). At least on VirusTotal the majority of the scans report it as malware. The miner also seems to mine the Monero cryptocurrency.