Backdoor

Backdoor.Win32.Bifrose.acci (file analysis)

Malware Removal

The Backdoor.Win32.Bifrose.acci is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Bifrose.acci virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Starts servers listening on 0.0.0.0:81
  • Reads data out of its own binary image
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Attempts to interact with an Alternate Data Stream (ADS)
  • Anomalous binary characteristics

How to determine Backdoor.Win32.Bifrose.acci?


File Info:

crc32: D8599465
md5: c452c0f9278cd03867e8e56e16ef67bb
name: C452C0F9278CD03867E8E56E16EF67BB.mlw
sha1: 74226bc25d53091238ba9709ce99fc8efb7dd759
sha256: f94712776092cc5734a30c31d14c9ed8e73a325882384d75d6fd3b504de8e7a6
sha512: 336434106a3cc260268d1fe062f8070012cb7e3152ecf1b5d8b24ead1d16ca80086f3bd1f3d977e55616ca7200c0e73e5f2294ae88aba25f32edf3b0d6e9f536
ssdeep: 12288:4Zss2QSJXO1tqaMI/alj3PNk4RfqiHtUKaLB3KfghN1N3GNK4nSQ+DiezRaCRI2:4Ztrk6bMNLkkPOnmNK4YDVam
type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows

Version Info:

InternalName: Bifrost
FileVersion: 1, 2, 1, 0
ProductName: Bifrost
ProductVersion: 1, 2, 1, 0
FileDescription: Bifrost 1.2.1
OriginalFilename: Bifrost.exe
Translation: 0x0409 0x04b0

Backdoor.Win32.Bifrose.acci also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 001788e91 )
Elasticmalicious (high confidence)
DrWebTrojan.Fakealert.36544
CynetMalicious (score: 100)
CAT-QuickHealVirTool.DelfInject.AF
ALYacGen:Backdoor.Heur.Bifrose.Bn1@bmkkN3b
ZillyaTool.Bifrose.Win32.380
SangforSuspicious.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
AlibabaBackdoor:Win32/Bifrose.e453f003
K7GWTrojan ( 001788e91 )
Cybereasonmalicious.9278cd
CyrenW32/Bifrost.A.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Packed.MoleboxUltra suspicious
APEXMalicious
AvastFileRepMalware
KasperskyBackdoor.Win32.Bifrose.acci
BitDefenderGen:Backdoor.Heur.Bifrose.Bn1@bmkkN3b
NANO-AntivirusRiskware.Win32.Bifrose.btwuau
MicroWorld-eScanGen:Backdoor.Heur.Bifrose.Bn1@bmkkN3b
TencentWin32.Trojan.Bifrose.Swuc
Ad-AwareGen:Backdoor.Heur.Bifrose.Bn1@bmkkN3b
SophosML/PE-A + Mal/BigMole-B
ComodoBackdoor.Win32.Curioso.~dy02@1xq8fq
BitDefenderThetaAI:Packer.A66A18CA1F
VIPREPacked.Win32.Rebhip.a (v)
TrendMicroTROJ_BREDLAB.SMD
McAfee-GW-EditionBehavesLike.Win32.Ransomware.tm
FireEyeGeneric.mg.c452c0f9278cd038
EmsisoftGen:Backdoor.Heur.Bifrose.Bn1@bmkkN3b (B)
SentinelOneStatic AI – Malicious PE
JiangminConstructor.Bifrose.jr
WebrootW32.Bifrose.Gen
AviraTR/Bifrose.EB.1
eGambitGeneric.Malware
Antiy-AVLTrojan/Generic.ASBOL.C615
MicrosoftTrojan:Win32/Wacatac.B!ml
SUPERAntiSpywareHeur.Agent/Gen-Bifrost
GDataGen:Backdoor.Heur.Bifrose.Bn1@bmkkN3b
Acronissuspicious
McAfeeArtemis!C452C0F9278C
MAXmalware (ai score=91)
VBA32BScope.Trojan.Inject
MalwarebytesBackdoor.Bifrose
PandaGeneric Malware
TrendMicro-HouseCallTROJ_BREDLAB.SMD
RisingTrojan.Generic@ML.100 (RDMK:wOckO+j8fVIP4FEEJEM/Rw)
YandexTrojan.GenAsa!XMiXPNBz8gY
IkarusConstructor.Win32.Bifrose
MaxSecurePacked.Rebhip.a
FortinetW32/Refroso.BKBI!tr
AVGFileRepMalware

How to remove Backdoor.Win32.Bifrose.acci?

Backdoor.Win32.Bifrose.acci removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment