Backdoor

Backdoor.Win32.Emotet.cfti removal guide

Malware Removal

The Backdoor.Win32.Emotet.cfti is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Emotet.cfti virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Expresses interest in specific running processes
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Attempts to modify proxy settings

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Backdoor.Win32.Emotet.cfti?


File Info:

crc32: E0AC1CD3
md5: 190427747b87979cf646f2626ffe11bf
name: upload_file
sha1: 48e37ad4f6fb7f2338d266d2913dc984d60d480c
sha256: f301a40fabd9d098c1528de8594674b51c4be885a312583bcc9dea0f0c2a3811
sha512: e03f9dacd249273500e8b98a87c15eb6eae5c71d9a85bd78d91495375f60a46fc757fc67d71cc2ce19d1581649167ca1a475c3ac0c6ada42a99668e18c59f38f
ssdeep: 12288:RfzaBuiszJbE9mO4sl9kVlAOyQkNvOzxo0:RbMmO4sl9sR2Ot/
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: x7248x6743x6240x6709 (C) 2002
InternalName: Pop3Monitor
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: Pop3Monitor x5e94x7528x7a0bx5e8f
ProductVersion: 1, 0, 0, 1
FileDescription: Pop3Monitor Microsoft x57fax7840x7c7bx5e94x7528x7a0bx5e8f
OriginalFilename: Pop3Monitor.EXE
Translation: 0x0804 0x04b0

Backdoor.Win32.Emotet.cfti also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKDZ.69487
CAT-QuickHealTrojan.CKGENERIC
ALYacTrojan.GenericKDZ.69487
VIPRETrojan.Win32.Generic!BT
CrowdStrikewin/malicious_confidence_60% (W)
BitDefenderTrojan.GenericKDZ.69487
K7GWRiskware ( 0040eff71 )
K7AntiVirusRiskware ( 0040eff71 )
TrendMicroTROJ_GEN.R011C0DHG20
BitDefenderThetaGen:NN.ZexaF.34186.Cq0@a0zEsDcb
CyrenW32/Emotet.AQB.gen!Eldorado
SymantecTrojan.Emotet
APEXMalicious
AvastWin32:Trojan-gen
ClamAVWin.Trojan.Emotet-9371544-0
KasperskyBackdoor.Win32.Emotet.cfti
AlibabaTrojan:Win32/Emotet.2a44023a
ViRobotTrojan.Win32.Emotet.458752.B
RisingTrojan.Kryptik!1.CA7F (CLOUD)
Ad-AwareTrojan.GenericKDZ.69487
F-SecureTrojan.TR/Redcap.gugdg
DrWebTrojan.DownLoader34.24265
ZillyaBackdoor.Emotet.Win32.1010
FireEyeTrojan.GenericKDZ.69487
SophosTroj/Emotet-CLD
IkarusTrojan-Banker.Emotet
JiangminBackdoor.Emotet.ra
WebrootW32.Trojan.Emotet
AviraTR/Redcap.gugdg
MAXmalware (ai score=83)
Antiy-AVLTrojan[Backdoor]/Win32.Emotet
MicrosoftTrojan:Win32/Emotet.ARJ!MTB
ArcabitTrojan.Generic.D10F6F
AhnLab-V3Trojan/Win32.Emotet.R347905
ZoneAlarmBackdoor.Win32.Emotet.cfti
GDataTrojan.GenericKDZ.69487
CynetMalicious (score: 85)
ESET-NOD32a variant of Win32/Kryptik.HFNV
McAfeeGenericRXLR-TI!190427747B87
TACHYONTrojan/W32.Emotet.458752.C
VBA32BScope.Backdoor.Emotet
MalwarebytesTrojan.Emotet
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R011C0DHG20
TencentMalware.Win32.Gencirc.10cde817
eGambitUnsafe.AI_Score_97%
FortinetW32/Kryptik.HCEJ!tr
AVGWin32:Trojan-gen
Paloaltogeneric.ml
Qihoo-360Generic/Trojan.9e8

How to remove Backdoor.Win32.Emotet.cfti?

Backdoor.Win32.Emotet.cfti removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment