Backdoor

What is “Backdoor.Win32.Emotet.cfzl”?

Malware Removal

The Backdoor.Win32.Emotet.cfzl is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Emotet.cfzl virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Expresses interest in specific running processes
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)

How to determine Backdoor.Win32.Emotet.cfzl?


File Info:

crc32: 2FCD6765
md5: e7b3b1a5a16b7f3371250f0bb075c4cf
name: upload_file
sha1: 2a08198e19470d9deafb7d187d2f18655117ffea
sha256: c95c192fd42d291641e6daba2dd0ffe30f301c3d0576e09c591011ca2799381a
sha512: f318470b989b765cc76b3be64ee8a01adca135fa844832f51e4ced4f20319c2312d1d61c597a6b2aba8e7f4c6636f9bde14f6aedca3c8eec77054ff0194187f3
ssdeep: 12288:sfzaBuiszJbE9mO4sl9kVlAOyQkNvOzxMrB:sbMmO4sl9sR2Otq
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: x7248x6743x6240x6709 (C) 2002
InternalName: Pop3Monitor
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: Pop3Monitor x5e94x7528x7a0bx5e8f
ProductVersion: 1, 0, 0, 1
FileDescription: Pop3Monitor Microsoft x57fax7840x7c7bx5e94x7528x7a0bx5e8f
OriginalFilename: Pop3Monitor.EXE
Translation: 0x0804 0x04b0

Backdoor.Win32.Emotet.cfzl also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
DrWebTrojan.DownLoader34.24265
MicroWorld-eScanTrojan.GenericKDZ.69487
FireEyeTrojan.GenericKDZ.69487
CAT-QuickHealTrojan.CKGENERIC
McAfeeGenericRXLR-TI!E7B3B1A5A16B
VIPRETrojan.Win32.Generic!BT
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderTrojan.GenericKDZ.69487
K7GWRiskware ( 0040eff71 )
TrendMicroTROJ_GEN.R011C0DHG20
BitDefenderThetaGen:NN.ZexaF.34186.Cq0@am7TmZjb
CyrenW32/Emotet.AQB.gen!Eldorado
SymantecTrojan.Emotet
TrendMicro-HouseCallTROJ_GEN.R011C0DHG20
AvastWin32:Trojan-gen
ClamAVWin.Trojan.Emotet-9371545-0
KasperskyBackdoor.Win32.Emotet.cfzl
AlibabaTrojan:Win32/Emotet.7bdbb3d7
ViRobotTrojan.Win32.Emotet.458752.B
RisingTrojan.Kryptik!1.CA7F (CLASSIC)
Ad-AwareTrojan.GenericKDZ.69487
Comodo.UnclassifiedMalware@0
F-SecureTrojan.TR/AD.Emotet.vtpcy
ZillyaBackdoor.Emotet.Win32.1010
SophosTroj/Emotet-CLD
IkarusTrojan-Banker.Emotet
JiangminBackdoor.Emotet.ra
WebrootW32.Trojan.Emotet
AviraTR/AD.Emotet.vtpcy
MAXmalware (ai score=81)
Antiy-AVLTrojan[Backdoor]/Win32.Emotet
MicrosoftTrojan:Win32/Emotet.ARJ!MTB
ArcabitTrojan.Generic.D10F6F
ZoneAlarmBackdoor.Win32.Emotet.cfzl
GDataTrojan.GenericKDZ.69487
CynetMalicious (score: 85)
AhnLab-V3Trojan/Win32.Emotet.R347905
VBA32BScope.Backdoor.Emotet
ALYacTrojan.GenericKDZ.69487
TACHYONTrojan/W32.Emotet.458752.C
MalwarebytesTrojan.Emotet
PandaTrj/Genetic.gen
APEXMalicious
ESET-NOD32Win32/Emotet.CD
TencentMalware.Win32.Gencirc.10cde817
eGambitUnsafe.AI_Score_98%
FortinetW32/Kryptik.HCEJ!tr
AVGWin32:Trojan-gen
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_60% (W)
Qihoo-360Generic/Trojan.9e8

How to remove Backdoor.Win32.Emotet.cfzl?

Backdoor.Win32.Emotet.cfzl removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment