Backdoor

Backdoor.PlitePMF.S22839200 removal

Malware Removal

The Backdoor.PlitePMF.S22839200 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.PlitePMF.S22839200 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Attempts to connect to a dead IP:Port (2 unique times)
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Korean
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Anomalous binary characteristics

How to determine Backdoor.PlitePMF.S22839200?


File Info:

name: 642AC419219366A440A9.mlw
path: /opt/CAPEv2/storage/binaries/5271a795be1f9d497a9e502d418aa6bd5838dac43a485407e7953372b1cf4bf6
crc32: FC273E01
md5: 642ac419219366a440a999b2b403b9aa
sha1: e452a69ef74bb59f32144d5f0e9ae77017062b96
sha256: 5271a795be1f9d497a9e502d418aa6bd5838dac43a485407e7953372b1cf4bf6
sha512: c3af2a7bda57d8c4bce57dc4d2187b88c855a14125409a8260fbc9ed5f67aad41f3364fc0c0c5b763289aebf32b0ea3cad256d7392cd867b7f8d552cba37f0fc
ssdeep: 6144:c/bE5G5KiR0J0dCsnGb/6VOpLc91WlvhDSNZl:A0G5obGGraOpUWlpI
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14A749C103A8180B5F36A0B714462E6E44A796C3E2BA1E58FF2B87D3969311D3977335F
sha3_384: 23f4b25b2f07a124f8ba4429b47d62a31e6af5b1459523d8b043b469747085aeeec87916913410deb85a1dff4244ab34
ep_bytes: e8286c0000e917feffff558bec81ec28
timestamp: 2013-08-01 06:52:06

Version Info:

0: [No Data]

Backdoor.PlitePMF.S22839200 also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.37750297
CAT-QuickHealBackdoor.PlitePMF.S22839200
ALYacTrojan.GenericKD.37750297
CylanceUnsafe
ZillyaTrojan.Urelas.Win32.12703
K7AntiVirusBackdoor ( 0053e8561 )
K7GWTrojan ( 005326d31 )
Cybereasonmalicious.921936
BaiduWin32.Rootkit.Agent.s
CyrenW32/Urelas.E.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Urelas.T
APEXMalicious
ClamAVWin.Malware.Urelas-9655843-0
KasperskyBackdoor.Win32.Plite.bhun
BitDefenderTrojan.GenericKD.37750297
NANO-AntivirusTrojan.Win32.cjasun.eaawqk
AvastMBR:Plite-I [Rtk]
TencentTrojan.Win32.BitCoinMiner.la
Ad-AwareTrojan.GenericKD.37750297
SophosML/PE-A + Troj/Urelas-Q
ComodoTrojWare.Win32.GupBoot.BFC@5szi8p
DrWebTrojan.AVKill.32446
VIPRETrojan.Win32.Urelas.ab (v)
McAfee-GW-EditionBehavesLike.Win32.Corrupt.fh
FireEyeGeneric.mg.642ac419219366a4
EmsisoftTrojan.GenericKD.37750297 (B)
GDataTrojan.GenericKD.37750297
JiangminTrojan/Generic.aywcp
AviraTR/Urelas.cllsb
Antiy-AVLTrojan/Generic.ASMalwS.272A055
ArcabitTrojan.Generic.D2400619
MicrosoftTrojan:Win32/Urelas.AA
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Urelas.R249060
Acronissuspicious
McAfeeCorrupt-FY!642AC4192193
MAXmalware (ai score=83)
VBA32Backdoor.Plite
MalwarebytesTrojan.Urelas
RisingTrojan.Gupboot!1.9CEA (CLASSIC)
YandexTrojan.GenAsa!bzZrcrZV+2M
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_99%
FortinetW32/Urelas.O!tr
BitDefenderThetaGen:NN.ZexaF.34294.vyX@auZVZApO
AVGMBR:Plite-I [Rtk]
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_90% (D)
MaxSecureTrojan.Malware.121218.susgen

How to remove Backdoor.PlitePMF.S22839200?

Backdoor.PlitePMF.S22839200 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment