Backdoor

About “Backdoor.Win32.Emotet.bztf” infection

Malware Removal

The Backdoor.Win32.Emotet.bztf is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Emotet.bztf virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Expresses interest in specific running processes
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Russian
  • Anomalous binary characteristics

Related domains:

redirector.gvt1.com
r4—sn-4g5ednsy.gvt1.com
update.googleapis.com

How to determine Backdoor.Win32.Emotet.bztf?


File Info:

crc32: 69327DED
md5: b9972d162570eb7981ee0ea45647199b
name: upload_file
sha1: 2896105a782509334eea9e1670221922a9a5c391
sha256: 038b415de0b13bd53d697df616a3527ecf94e7739026e311270956436a673034
sha512: d4358bf32a0a58bf8d9467b533f8cad37a14137079ca0fa6383f296d7ccdc368ada99c519380de883634eacb0c3400023c725476ef3802277496f7408a793a8e
ssdeep: 3072:xpocVfb++Xuy7YXDxaOhlSMzVpkxno3mOuTb4vMDc3Ncg/5Z0dKekyOI:7DZ++eNTxyAvkucbGMsGS5
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) 2002
InternalName: ExpCheckTest
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: ExpCheckTest Application
ProductVersion: 1, 0, 0, 1
FileDescription: ExpCheckTest MFC Application
OriginalFilename: ExpCheckTest.EXE
Translation: 0x0409 0x04b0

Backdoor.Win32.Emotet.bztf also known as:

BkavW32.AIDetectVM.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKDZ.69449
FireEyeTrojan.GenericKDZ.69449
CAT-QuickHealTrojan.CKGENERIC
ALYacTrojan.GenericKDZ.69449
VIPRETrojan.Win32.Generic!BT
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderTrojan.GenericKDZ.69449
K7GWTrojan ( 0056c87c1 )
K7AntiVirusTrojan ( 0056c87c1 )
TrendMicroTrojanSpy.Win32.EMOTET.THHAEBO
CyrenW32/Emotet.APS.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Packed.Emotet-9371538-0
KasperskyBackdoor.Win32.Emotet.bztf
AlibabaTrojan:Win32/Emotet.2fd19294
ViRobotTrojan.Win32.Emotet.188416.B
RisingTrojan.Emotet!8.B95 (CLOUD)
Ad-AwareTrojan.GenericKDZ.69449
Comodo.UnclassifiedMalware@0
F-SecureTrojan.TR/Crypt.Agent.senxj
DrWebTrojan.Emotet.1000
ZillyaBackdoor.Emotet.Win32.1035
SophosTroj/Emotet-CLB
IkarusTrojan-Banker.Emotet
JiangminBackdoor.Emotet.qv
AviraTR/Crypt.Agent.senxj
MAXmalware (ai score=80)
Antiy-AVLTrojan[Backdoor]/Win32.Emotet
MicrosoftTrojan:Win32/Emotet.ARJ!MTB
ArcabitTrojan.Generic.D10F49
ZoneAlarmBackdoor.Win32.Emotet.bztf
GDataTrojan.GenericKDZ.69449
AhnLab-V3Trojan/Win32.Emotet.R348051
McAfeeEmotet-FQS!B9972D162570
TACHYONBackdoor/W32.Emotet.188416
VBA32Backdoor.Emotet
MalwarebytesTrojan.MalPack.TRE
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Kryptik.HFMZ
TrendMicro-HouseCallTrojanSpy.Win32.EMOTET.THHAEBO
TencentMalware.Win32.Gencirc.10cde85d
FortinetW32/Kryptik.HCEJ!tr
AVGWin32:BankerX-gen [Trj]
AvastWin32:BankerX-gen [Trj]
Qihoo-360Generic/Trojan.c2a

How to remove Backdoor.Win32.Emotet.bztf?

Backdoor.Win32.Emotet.bztf removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment