Malware

Application.Agent.KDJ (B) malicious file

Malware Removal

The Application.Agent.KDJ (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.Agent.KDJ (B) virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Created a process from a suspicious location

How to determine Application.Agent.KDJ (B)?


File Info:

name: D83E5F8EB92FC0A14777.mlw
path: /opt/CAPEv2/storage/binaries/14bdaaa481ef72e6109e90843236dcb1b81942ebc1d39722486095c072d98b71
crc32: 4F791D13
md5: d83e5f8eb92fc0a14777b1c3935e4c6f
sha1: f00037a7c0cf57e2b008910275c24ad9ad6c3793
sha256: 14bdaaa481ef72e6109e90843236dcb1b81942ebc1d39722486095c072d98b71
sha512: 6fb3b8971b551ab9674970c7fe35d943659b117bfe5da68f874540d9c1dce9e427658fd2929c5e771112a4ca5fca3c97e2352e36eaa7ec2fc9ff7e6adc3a7578
ssdeep: 12288:SoVl2TmnvZAdJ41JHQ1X+tiHb8GTLeFjZ7n/BWk7:rVgmnudJ41JW4iejVos
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T11FB4E101FEC155B3C6310C325629AB61693DBD211F248FEBA3E45A1DEA341D0EB39B67
sha3_384: abbb1cf9673d3c9caba2fc59c8141ae38dc6886146af11eab2e50e424167060cc7e165f68a6df2f5252faee62c7c44c7
ep_bytes: e864040000e988feffff3b0d68e64300
timestamp: 2021-05-17 07:28:58

Version Info:

0: [No Data]

Application.Agent.KDJ (B) also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Malicious.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanApplication.Agent.KDJ
FireEyeGeneric.mg.d83e5f8eb92fc0a1
McAfeeArtemis!D83E5F8EB92F
CylanceUnsafe
ZillyaTrojan.Agensla.Win32.11816
SangforRiskware.Win32.Uwamson.A
K7AntiVirusRiskware ( 0040eff71 )
AlibabaBackdoor:Win32/GRAFTOR.e739d5dd
K7GWRiskware ( 0040eff71 )
VirITBackdoor.Win32.Xtreme.BM
CyrenW32/Agent.BJD.gen!Eldorado
SymantecTrojan.Gen.MBT
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Trojan.Generic-9910699-0
BitDefenderApplication.Agent.KDJ
AvastWin32:Malware-gen
EmsisoftApplication.Agent.KDJ (B)
DrWebBackDoor.Xtreme.38
TrendMicroTrojan.Win32.GRAFTOR.AM
McAfee-GW-EditionBehavesLike.Win32.Generic.hc
SophosGeneric PUA PA (PUA)
SentinelOneStatic AI – Malicious SFX
AviraHEUR/AGEN.1115821
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataApplication.Agent.KDJ
CynetMalicious (score: 100)
ALYacApplication.Agent.KDJ
MAXmalware (ai score=84)
VBA32Backdoor.Xtreme
MalwarebytesMalware.AI.2113132414
TrendMicro-HouseCallTrojan.Win32.GRAFTOR.AM
RisingMalware.DownloadSponsor!8.12DDC (CLOUD)
YandexBackDoor.Xtreme!85iBajSa6Qw
IkarusBackdoor.Xtreme
MaxSecureTrojan.Malware.300983.susgen
FortinetMalicious_Behavior.SB
AVGWin32:Malware-gen

How to remove Application.Agent.KDJ (B)?

Application.Agent.KDJ (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment