N
The Daily Insight

Trojan:Win32/SiennaPurple.A!dha

Author

Daniel Foster

Updated on February 26, 2026

Trojan:Win32/SiennaPurple.A!dha detection is a malware detection you can spectate in your system. It usually shows up after the preliminary activities on your computer – opening the suspicious e-mail, clicking the advertisement in the Internet or setting up the program from unreliable sources. From the second it shows up, you have a short time to act before it starts its malicious activity. And be sure – it is much better not to wait for these harmful actions.

What is Trojan:Win32/SiennaPurple.A!dha virus?

Trojan:Win32/SiennaPurple.A!dha is ransomware-type malware. It looks for the files on your disks, ciphers it, and after that asks you to pay the ransom for receiving the decryption key. Besides making your files inaccessible, this virus additionally does a ton of damage to your system. It changes the networking settings in order to stop you from looking for the elimination articles or downloading the antivirus. In some cases, Trojan:Win32/SiennaPurple.A!dha can additionally block the setup of anti-malware programs.

Trojan:Win32/SiennaPurple.A!dha Summary

Summarizingly, Trojan:Win32/SiennaPurple.A!dha ransomware actions in the infected system are next:

  • SetUnhandledExceptionFilter detected (possible anti-debug);
  • Attempts to connect to a dead IP:Port (1 unique times);
  • Dynamic (imported) function loading detected;
  • Authenticode signature is invalid;
  • Encrypting the documents kept on the target’s disk drive — so the victim cannot use these files;
  • Blocking the launching of .exe files of anti-malware apps
  • Blocking the launching of installation files of anti-virus apps

Ransomware has actually been a nightmare for the last 4 years. It is challenging to picture a more harmful virus for both individuals and corporations. The algorithms used in Trojan:Win32/SiennaPurple.A!dha (usually, RHA-1028 or AES-256) are not hackable – with minor exclusions. To hack it with a brute force, you need to have a lot more time than our galaxy actually exists, and possibly will exist. But that virus does not do all these unpleasant things immediately – it may require up to a few hours to cipher all of your documents. Thus, seeing the Trojan:Win32/SiennaPurple.A!dha detection is a clear signal that you should start the elimination procedure.

Where did I get the Trojan:Win32/SiennaPurple.A!dha?

Ordinary tactics of Trojan:Win32/SiennaPurple.A!dha distribution are typical for all other ransomware examples. Those are one-day landing web pages where users are offered to download the free software, so-called bait e-mails and hacktools. Bait e-mails are a relatively new strategy in malware distribution – you receive the e-mail that simulates some regular notifications about shippings or bank service conditions updates. Inside of the email, there is an infected MS Office file, or a web link which opens the exploit landing page.

Malicious email spam

Malicious email message. This one tricks you to open the phishing website.

Preventing it looks quite uncomplicated, but still needs tons of recognition. Malware can hide in different places, and it is better to stop it even before it invades your system than to trust in an anti-malware program. General cybersecurity awareness is just an important item in the modern world, even if your interaction with a PC remains on YouTube videos. That may keep you a lot of time and money which you would certainly spend while trying to find a fixing guide.

Trojan:Win32/SiennaPurple.A!dha malware technical details

File Info:

name: 54CA404D16DB18D233C6.mlwpath: /opt/CAPEv2/storage/binaries/99fc54786a72f32fd44c7391c2171ca31e72ca52725c68e2dde94d04c286fccdcrc32: 257ECBB2md5: 54ca404d16db18d233c606b48c73d66fsha1: d7d472bfc62bd6f52e3b4b3c7e88b92b664dd142sha256: 99fc54786a72f32fd44c7391c2171ca31e72ca52725c68e2dde94d04c286fccdsha512: 7e050f69257338bbb129b64671055d68e4232404f440c19157553eb9ddf103ec17f1053438d6692f29e921ca9e384ced684b4f89c0756ef9b414978aefdb5941ssdeep: 24576:RtpRWh9e6yT5p0qMBNEYhw+fEh9vnwR76aNGu:Rch9JqMBNZNMh962ctype: PE32 executable (GUI) Intel 80386, for MS Windowstlsh: T1D465BE22FB40D132F6A10072DA2D9F6B995CAE31673444D3B3D44E1E6AB48E35E36B47sha3_384: ae402b758920cb39e5c024c0752ae284e3b39b2c17ac54c47620454f1e6c6f4da540ef882d574ae529d72d7803806540ep_bytes: e8e3a50000e97ffeffff558bec568bf1timestamp: 2021-10-08 04:32:44

Version Info:

0: [No Data]

Trojan:Win32/SiennaPurple.A!dha also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Bodegun.4!c
FireEyeGen:Heur.Bodegun.8
CAT-QuickHealTrojan.Siennapurple
McAfeeRansomware-HKH!54CA404D16DB
VIPREGen:Heur.Bodegun.8
SangforTrojan.Win32.Siennapurple.Vh0z
K7AntiVirusTrojan ( 00595a181 )
AlibabaTrojan:Win32/SiennaPurple.3bcf57f2
K7GWTrojan ( 00595a181 )
Cybereasonmalicious.d16db1
SymantecRansom.Gen
Elasticmalicious (high confidence)
ESET-NOD32Win32/Filecoder.OLY
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Win32.Agentb.gen
BitDefenderGen:Heur.Bodegun.8
ViRobotTrojan.Win32.S.Agent.1435136.B
MicroWorld-eScanGen:Heur.Bodegun.8
AvastWin32:Malware-gen
TencentWin32.Trojan.Filecoder.Swva
Ad-AwareGen:Heur.Bodegun.8
EmsisoftGen:Heur.Bodegun.8 (B)
McAfee-GW-EditionBehavesLike.Win32.Generic.th
SophosMal/Generic-S + Troj/Ransom-GRL
GDataGen:Heur.Bodegun.8
WebrootW32.Ransom.H0lygh0st
ArcabitTrojan.Bodegun.8
ZoneAlarmHEUR:Trojan.Win32.Agentb.gen
MicrosoftTrojan:Win32/SiennaPurple.A!dha
AhnLab-V3Trojan/Win.SiennaPurple.C5207112
ALYacTrojan.Ransom.HolyGhost
MAXmalware (ai score=85)
CylanceUnsafe
TrendMicro-HouseCallTROJ_GEN.R002H01GE22
RisingRansom.Agent!8.6B7 (CLOUD)
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/PossibleThreat
BitDefenderThetaGen:NN.ZexaF.34786.xrW@aO2Cb4
AVGWin32:Malware-gen
PandaTrj/GdSda.A

How to remove Trojan:Win32/SiennaPurple.A!dha?

Trojan:Win32/SiennaPurple.A!dha malware is incredibly difficult to delete by hand. It puts its files in multiple locations throughout the disk, and can restore itself from one of the elements. In addition, countless changes in the registry, networking setups and Group Policies are pretty hard to find and revert to the initial. It is much better to make use of a specific app – exactly, an anti-malware tool. GridinSoft Anti-Malware will fit the best for virus removal objectives.

Why GridinSoft Anti-Malware? It is very light-weight and has its databases updated almost every hour. In addition, it does not have such bugs and vulnerabilities as Microsoft Defender does. The combination of these details makes GridinSoft Anti-Malware ideal for clearing away malware of any form.

Download GridinSoft Anti-Malware

Remove the viruses with GridinSoft Anti-Malware

  • Download and install GridinSoft Anti-Malware. After the installation, you will be offered to perform the Standard Scan. Approve this action.
  • Gridinsoft Anti-Malware during the scan process
  • Standard scan checks the logical disk where the system files are stored, together with the files of programs you have already installed. The scan lasts up to 6 minutes.
  • GridinSoft Anti-Malware scan results
  • When the scan is over, you may choose the action for each detected virus. For all files of [SHORT_NAME] the default option is “Delete”. Press “Apply” to finish the malware removal.
  • GridinSoft Anti-Malware - After Cleaning