Backdoor Trojan

Backdoor.RemoteAccessTrojan removal tips

Malware Removal

The Backdoor.RemoteAccessTrojan is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.RemoteAccessTrojan virus can do?

  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Backdoor.RemoteAccessTrojan?


File Info:

name: BB81D73396EC31550283.mlw
path: /opt/CAPEv2/storage/binaries/bc255555d34c2741ebdc47eba80e645409adc94277bf7e3fac101f168828dfd5
crc32: D1B0D279
md5: bb81d73396ec31550283a044402672af
sha1: a4b5a5642e91e4a8dca88aeef3527dcb1b72d9e3
sha256: bc255555d34c2741ebdc47eba80e645409adc94277bf7e3fac101f168828dfd5
sha512: 3aea046975d67cb8cd196aaa72521fd534b4b4c0742ce8e8c7828ed619226f2d970ed79ccf72991c8fec40a0db23c4237d30e7c8b4847e17e93fe775b8ed7692
ssdeep: 3072:Sb91JqCN/WWPIv0kAGzd+hBgO2TfWBH9f0vFUBlcPDJV+hmBUYOsSO+gwLnW8ozc:+5emIFnd+hQAxwGWIpHCN4C9imqoYv
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T17B74BF11B4818432E9771A314AF9D6769ABCBD100F2496DBB3C8977D8F342D27A3172B
sha3_384: 0bf5d657346ec6800f5dcde401a1b54adf06378e593f111c3db6ced21f2bad4ca231b8d748db1dabe2e4b3ebd72737b2
ep_bytes: e81a080000e980feffffcccccccccccc
timestamp: 2024-01-14 12:55:21

Version Info:

CompanyName: 华为科技
FileDescription: 360
FileVersion: 1.0.0.1
InternalName: 小马.exe
LegalCopyright: Copyright (C) 2024
OriginalFilename: 小马.exe
ProductName: 360
ProductVersion: 1.0.0.1
Translation: 0x0804 0x04b0

Backdoor.RemoteAccessTrojan also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.DInvoke.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.71232447
SkyhighArtemis!Trojan
ALYacTrojan.GenericKD.71232447
Cylanceunsafe
SangforTrojan.Win32.Kryptik.Vn5d
K7AntiVirusTrojan ( 005b0bba1 )
AlibabaTrojan:Win32/DInvoke.21382c74
K7GWTrojan ( 005b0bba1 )
CrowdStrikewin/malicious_confidence_90% (W)
BitDefenderThetaGen:NN.ZexaF.36680.vy2@aytwznjj
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HVXN
CynetMalicious (score: 100)
APEXMalicious
KasperskyHEUR:Trojan.Win32.DInvoke.gen
BitDefenderTrojan.GenericKD.71232447
AvastWin32:Malware-gen
TencentMalware.Win32.Gencirc.11bb3f5f
EmsisoftTrojan.GenericKD.71232447 (B)
F-SecureTrojan.TR/AD.Nekark.ykeff
VIPRETrojan.GenericKD.71232447
TrendMicroBackdoor.Win32.ASYNCRAT.YXEAOZ
SophosMal/Generic-S
IkarusTrojan.Win32.Crypt
AviraTR/AD.Nekark.ykeff
Antiy-AVLTrojan/Win32.Kryptik
KingsoftWin32.Trojan.DInvoke.gen
MicrosoftTrojan:Win32/ScarletFlash.A
ArcabitTrojan.Generic.D43EEBBF
ZoneAlarmHEUR:Trojan.Win32.DInvoke.gen
GDataTrojan.GenericKD.71232447
GoogleDetected
McAfeeArtemis!BB81D73396EC
MalwarebytesBackdoor.RemoteAccessTrojan
TrendMicro-HouseCallBackdoor.Win32.ASYNCRAT.YXEAOZ
RisingTrojan.Kryptik!8.8 (CLOUD)
SentinelOneStatic AI – Malicious PE
FortinetW32/Kryptik.HVXN!tr
AVGWin32:Malware-gen
DeepInstinctMALICIOUS

How to remove Backdoor.RemoteAccessTrojan?

Backdoor.RemoteAccessTrojan removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment