Backdoor

About “Backdoor.Generic.463193 (B)” infection

Malware Removal

The Backdoor.Generic.463193 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Generic.463193 (B) virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Possible date expiration check, exits too soon after checking local time
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs HTTP requests potentially not found in PCAP.
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • Enumerates running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Code injection with CreateRemoteThread in a remote process
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Steals private information from local Internet browsers
  • Collects and encrypts information about the computer likely to send to C2 server
  • Installs itself for autorun at Windows startup
  • Attempts to modify proxy settings
  • Attempts to modify browser security settings
  • Harvests credentials from local FTP client softwares
  • Collects information to fingerprint the system
  • Clears web history

How to determine Backdoor.Generic.463193 (B)?


File Info:

name: F5E8FE7AB918215FC15E.mlw
path: /opt/CAPEv2/storage/binaries/47086681063e2bb8dd833a65e0b5f074176c0ff22a4052ca395205b11873fb52
crc32: C87D83D8
md5: f5e8fe7ab918215fc15e3d46e2dda3c8
sha1: 59ee4cf293038df9678fe73c30f4650813f079fb
sha256: 47086681063e2bb8dd833a65e0b5f074176c0ff22a4052ca395205b11873fb52
sha512: df73441c8b49cf57c9fa4544d324a879ee4955c253fd2552773e0b12f998d35728e290cffa4fde3738439fb9061d4f0198a545f6a26cb6221a0fa501392ef20a
ssdeep: 3072:JI3HzbnAdLyT0LjmATPIfFqeFYtv3lwHrrEc:QzLILiwtmFqeFUaHrrf
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T140E3E146A2CA3E10C37425F9A04FAF7A9090D937A866C650D3EF0F43C6B9F152BD6169
sha3_384: 7e7d596dda00febbd099f73f38e74de56617b57103d5942be86fdfb32365150d1015f889809627d17773750a6af1fc50
ep_bytes: 60be153034018dbeebdf0bff57eb0b90
timestamp: 2007-10-22 23:20:52

Version Info:

0: [No Data]

Backdoor.Generic.463193 (B) also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Generic.4!c
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Panda.387
CynetMalicious (score: 100)
FireEyeGeneric.mg.f5e8fe7ab918215f
ALYacBackdoor.Generic.463193
CylanceUnsafe
VIPREPacked.Win32.Zbot.gen.y.7 (v)
SangforSuspicious.Win32.Save.a
AlibabaTrojanPSW:Win32/Kryptik.9d77cb74
CrowdStrikewin/malicious_confidence_90% (W)
BitDefenderThetaAI:Packer.CEB2AC8A1E
VirITTrojan.Win32.Generic.VSM
CyrenW32/Zbot.AU.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.GYS
Paloaltogeneric.ml
ClamAVWin.Trojan.Zbot-12392
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderBackdoor.Generic.463193
NANO-AntivirusTrojan.Win32.Zbot.bsqrn
SUPERAntiSpywareTrojan.Agent/Gen-Zbot
MicroWorld-eScanBackdoor.Generic.463193
AvastWin32:Malware-gen
TencentWin32.Trojan.Spy.Efkq
Ad-AwareBackdoor.Generic.463193
EmsisoftBackdoor.Generic.463193 (B)
ComodoMalCrypt.Indus!@1qrzi1
ZillyaTrojan.Zbot.Win32.44693
McAfee-GW-EditionBehavesLike.Win32.ZBot.cc
SophosML/PE-A + Mal/Zbot-U
IkarusTrojan-Spy.Win32.Zbot
GDataBackdoor.Generic.463193
JiangminTrojanSpy.Zbot.aoar
WebrootW32.Malware.Gen
AviraTR/Spy.Zbot.acyp
Antiy-AVLTrojan/Win32.Unknown
KingsoftWin32.Troj.Undef.(kcloud)
ArcabitBackdoor.Generic.D71159
ViRobotTrojan.Win32.A.Zbot.145408.BZ
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftPWS:Win32/Zbot.gen!Y
SentinelOneStatic AI – Malicious PE
AhnLab-V3Spyware/Win32.Zbot.R32084
McAfeePWS-Zbot.gen.pp
VBA32Trojan.Zeus.EA.0999
MalwarebytesMalware.AI.1193584800
APEXMalicious
RisingTrojan.Win32.Generic.1248005A (C64:YzY0OhgzMuRWNHHO)
MAXmalware (ai score=99)
MaxSecureTrojan.Malware.3148864.susgen
FortinetW32/Zbot.U!tr
AVGWin32:Malware-gen
Cybereasonmalicious.ab9182
PandaTrj/Genetic.gen

How to remove Backdoor.Generic.463193 (B)?

Backdoor.Generic.463193 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment