Backdoor

Backdoor.Berbew.G6 removal instruction

Malware Removal

The Backdoor.Berbew.G6 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Berbew.G6 virus can do?

  • Sample contains Overlay data
  • Authenticode signature is invalid

How to determine Backdoor.Berbew.G6?


File Info:

name: AA6B5F64E65AF52DC0C0.mlw
path: /opt/CAPEv2/storage/binaries/517edc22273a87635c9287dee5962b5d70bbad865c2b63e21db8e85b63778ac1
crc32: 60AD641C
md5: aa6b5f64e65af52dc0c085b0f14d6e37
sha1: 88d60158c932ec03b3c8cbec64168fd89845ae85
sha256: 517edc22273a87635c9287dee5962b5d70bbad865c2b63e21db8e85b63778ac1
sha512: 8575c6d79d141a665eb3f0bf5812c3b359316b4d3ba22044edb20f3dfd470d813b2dcc80951c2e2c4a8893abe2c85b811e7f756036a2a60e980cb735df079783
ssdeep: 48:6EQt5YVOSVVEPy+wEMmqiHNpU10BB+BDq9J5SV3DY:CSVVEPozmB7zB+FqX5S1D
type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
tlsh: T1A5D18593FB0444F6C08C0D7141BE2626A3BDA23C26D9904EDF508D311C9CEEBED78685
sha3_384: ad3e95dee6cbdd0834ddd38cbcf18164617ab72730bc7993e56ebd7e571dcb801cdc0a0d26c7ab2a3a9c7ff4b8fbeee9
ep_bytes: 5589e5535657837d0c017505e8230000
timestamp: 2004-05-23 06:33:08

Version Info:

0: [No Data]

Backdoor.Berbew.G6 also known as:

BkavW32.FamVT.PadoraVM.Trojan
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.GenericKD.67148045
CAT-QuickHealBackdoor.Berbew.G6
SkyhighBehavesLike.Win32.BackdoorAXJdll.xz
McAfeeBackDoor-AXJ.dll.gen
MalwarebytesGeneric.Malware.AI.DDS
VIPRETrojan.GenericKD.67148045
SangforSuspicious.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
K7GWSpyware ( 000021441 )
K7AntiVirusBackdoor ( 000021441 )
BaiduWin32.Backdoor.Padodor.a
VirITBackdoor.Win32.Generic.XJJ
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Padodor.gen
APEXMalicious
TrendMicro-HouseCallBKDR_PADODOR.AC
ClamAVWin.Trojan.Berbew-9845290-1
KasperskyBackdoor.Win32.Padodor.gen
BitDefenderTrojan.GenericKD.67148045
NANO-AntivirusTrojan.Win32.Qukart.etusjd
AvastWin32:Kraton-A [Trj]
TencentTrojan.Win32.Qukart.yc
EmsisoftTrojan.GenericKD.67148045 (B)
F-SecureTrojan.TR/ATRAPS.Gen
DrWebBackDoor.HangUp.46592
ZillyaBackdoor.Padodor.Win32.137
TrendMicroBKDR_PADODOR.AC
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.aa6b5f64e65af52d
SophosMal/Padodor-A
SentinelOneStatic AI – Malicious PE
MAXmalware (ai score=87)
JiangminTrojanSpy.Qukart.c.Dll
GoogleDetected
AviraTR/ATRAPS.Gen
VaristW32/Backdoor.YYVZ-2405
Antiy-AVLTrojan[Backdoor]/Win32.Padodor
Kingsoftmalware.kb.a.992
MicrosoftBackdoor:Win32/Berbew
XcitiumBackdoor.Win32.Padodor.gen0@1c5gkz
ArcabitTrojan.Generic.D400990D
ViRobotBackdoor.Win32.Padodor.Gen.A
ZoneAlarmBackdoor.Win32.Padodor.gen
GDataWin32.Backdoor.Padodor.A
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Padodor.R374324
Acronissuspicious
BitDefenderThetaGen:NN.ZedlaF.36802.ay5@aSMHRzf
ALYacTrojan.GenericKD.67148045
TACHYONBackdoor/W32.Padodor.6657.U
VBA32BScope.Backdoor.Padodor
Cylanceunsafe
PandaBck/Webber.gen
RisingBackdoor.Berbew!1.AE6C (CLASSIC)
IkarusTrojan.Win32.Padodor
MaxSecureTrojan.Proxy.Qukart.gen
FortinetW32/Qukart.K!tr
AVGWin32:Kraton-A [Trj]
DeepInstinctMALICIOUS
alibabacloudTrojan:Win/Berbew.b2f52889

How to remove Backdoor.Berbew.G6?

Backdoor.Berbew.G6 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment