Backdoor

Backdoor.Win32.Emotet.cgaf malicious file

Malware Removal

The Backdoor.Win32.Emotet.cgaf is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Emotet.cgaf virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Expresses interest in specific running processes
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Attempts to modify proxy settings

How to determine Backdoor.Win32.Emotet.cgaf?


File Info:

crc32: 658EED0A
md5: c9129d51523244509930628540c20984
name: upload_file
sha1: 218dff734fb3e156dbc83f6b12c536637d96fd2c
sha256: 665d36ad7a8cddaffd55ec3a4c077da124e318183d72c3059a5868c7eea4a35a
sha512: d9f25f944279670ddd2f56bb5413e00a20a611314bb4dd5a91bfe498a0547e3e91e243867820813525ef4a0ece8f6db31393c2b2854d3d44b702805d523eedd7
ssdeep: 12288:0fzaBuiszJbE9mO4sl9kVlAOyQkNvOzxMrB:0bMmO4sl9sR2Otq
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: x7248x6743x6240x6709 (C) 2002
InternalName: Pop3Monitor
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: Pop3Monitor x5e94x7528x7a0bx5e8f
ProductVersion: 1, 0, 0, 1
FileDescription: Pop3Monitor Microsoft x57fax7840x7c7bx5e94x7528x7a0bx5e8f
OriginalFilename: Pop3Monitor.EXE
Translation: 0x0804 0x04b0

Backdoor.Win32.Emotet.cgaf also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKDZ.69487
FireEyeTrojan.GenericKDZ.69487
ALYacTrojan.GenericKDZ.69487
MalwarebytesTrojan.Emotet
VIPRETrojan.Win32.Generic!BT
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderTrojan.GenericKDZ.69487
K7GWRiskware ( 0040eff71 )
TrendMicroTROJ_GEN.R002C0DHG20
BitDefenderThetaGen:NN.ZexaF.34186.Cq0@aCRl85eb
CyrenW32/Emotet.AQB.gen!Eldorado
SymantecTrojan.Emotet
APEXMalicious
AvastWin32:Trojan-gen
ClamAVWin.Trojan.Emotet-9371545-0
KasperskyBackdoor.Win32.Emotet.cgaf
AlibabaTrojan:Win32/Emotet.7cedbb32
ViRobotTrojan.Win32.Emotet.458752.B
RisingTrojan.Kryptik!1.CA7F (CLOUD)
Ad-AwareTrojan.GenericKDZ.69487
Comodo.UnclassifiedMalware@0
F-SecureTrojan.TR/AD.Emotet.nopxf
DrWebTrojan.DownLoader34.24265
ZillyaBackdoor.Emotet.Win32.1010
SophosTroj/Emotet-CLD
JiangminBackdoor.Emotet.ra
WebrootW32.Trojan.Emotet
AviraTR/AD.Emotet.nopxf
MAXmalware (ai score=89)
Antiy-AVLTrojan[Backdoor]/Win32.Emotet
MicrosoftTrojan:Win32/Emotet.ARJ!MTB
ArcabitTrojan.Generic.D10F6F
ZoneAlarmBackdoor.Win32.Emotet.cgaf
GDataTrojan.GenericKDZ.69487
CynetMalicious (score: 85)
AhnLab-V3Trojan/Win32.Emotet.R347905
McAfeeGenericRXLR-TI!C9129D515232
TACHYONTrojan/W32.Emotet.458752.C
VBA32BScope.Backdoor.Emotet
PandaTrj/Genetic.gen
ESET-NOD32Win32/Emotet.CD
TrendMicro-HouseCallTROJ_GEN.R002C0DHG20
TencentMalware.Win32.Gencirc.10cde817
IkarusTrojan-Banker.Emotet
eGambitUnsafe.AI_Score_98%
FortinetW32/Kryptik.HCEJ!tr
AVGWin32:Trojan-gen
CrowdStrikewin/malicious_confidence_60% (W)
Qihoo-360Generic/Trojan.9e8

How to remove Backdoor.Win32.Emotet.cgaf?

Backdoor.Win32.Emotet.cgaf removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment