Backdoor

Backdoor.26 removal guide

Malware Removal

The Backdoor.26 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.26 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Reads data out of its own binary image
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • Executable file is packed/obfuscated with ASPack
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Created a service that was not started

How to determine Backdoor.26?


File Info:

name: AA9C4A1EEC8202FB1D73.mlw
path: /opt/CAPEv2/storage/binaries/f58ef78238ffe027907160c115ead8a88648b283cd0a55ed3f2b3918242fef70
crc32: 2437BD0A
md5: aa9c4a1eec8202fb1d735e41b7ee4394
sha1: 0b6644b07c521741a6a273efd52551fe50fb9276
sha256: f58ef78238ffe027907160c115ead8a88648b283cd0a55ed3f2b3918242fef70
sha512: d723b4eb68841484cc198748ec591f53b29f5d40ee47655a5731d0eee09b890ab601163aa8ec4be205078562c96225a8262b61236329b41d34a3cc41fe98c2a0
ssdeep: 1536:2Tk2KMqc7buEU/pls8hNRb4pz61Qj96wkr9EPHxdynWhNcW7WU:bo7buEU/zTN1I6lh8TN3
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1938302D90B0F9CEAD6D13D3372BF0850E2AB6D583E98014793B5E7BD691E05ED4B8608
sha3_384: 2d01782a006c3e60e869b69777f0fa333f74fd90d3d38ffaa8f7899b011b7094a7be5be15a23029f57b16f0c375a51d2
ep_bytes: 60e803000000e9eb045d4555c3e80100
timestamp: 2011-01-03 11:39:54

Version Info:

0: [No Data]

Backdoor.26 also known as:

tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Backdoor.26
FireEyeGeneric.mg.aa9c4a1eec8202fb
CAT-QuickHealExploit.ShellCode.Gen
ALYacGen:Variant.Backdoor.26
CylanceUnsafe
VIPREGen:Variant.Backdoor.26
SangforSuspicious.Win32.Save.ins
K7AntiVirusBackdoor ( 00563cbc1 )
K7GWBackdoor ( 00563cbc1 )
Cybereasonmalicious.eec820
CyrenW32/S-73c94f7f!Eldorado
SymantecW32.Wapomi.C!inf
Elasticmalicious (high confidence)
ESET-NOD32Win32/Wapomi.X
APEXMalicious
ClamAVWin.Trojan.Wapomi-9939693-0
KasperskyBackdoor.Win32.Agent.bfax
BitDefenderGen:Variant.Backdoor.26
NANO-AntivirusVirus.Win32.Gen.ccmw
AvastFileRepMalware [Wrm]
TencentTrojan.Win32.KillAV.aaf
Ad-AwareGen:Variant.Backdoor.26
EmsisoftGen:Variant.Backdoor.26 (B)
ComodoTrojWare.Win32.Agent.kajoh@2no451
DrWebBackDoor.Siggen.40151
ZillyaBackdoor.Agent.Win32.27075
TrendMicroPE_WAPOMI.SM-O
McAfee-GW-EditionBehavesLike.Win32.Ransomware.mc
Trapminemalicious.high.ml.score
SophosML/PE-A + Mal/Behav-016
SentinelOneStatic AI – Malicious PE
JiangminBackdoor/Agent.cpie
WebrootW32.Malware.Gen
GoogleDetected
AviraEXP/ShellCode.psa
MAXmalware (ai score=87)
Antiy-AVLTrojan/Generic.ASMalwS.61
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataGen:Variant.Backdoor.26
CynetMalicious (score: 100)
AhnLab-V3Backdoor/Win32.Agent.R2670
McAfeeGenericRXAA-FA!AA9C4A1EEC82
VBA32BScope.Backdoor.Bdaejec
MalwarebytesMalware.AI.3277869085
TrendMicro-HouseCallPE_WAPOMI.SM-O
RisingVirus.Wapomi!8.55 (CLOUD)
YandexTrojan.GenAsa!wEiUiOeoewc
IkarusExploit.Win32.ShellCode
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Agent.JH!tr
BitDefenderThetaGen:NN.ZexaF.34682.fKWba0jnfBhb
AVGFileRepMalware [Wrm]
PandaTrj/Agent.OJS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Backdoor.26?

Backdoor.26 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment