Backdoor

Backdoor.Win32.Emotet.cgci removal tips

Malware Removal

The Backdoor.Win32.Emotet.cgci is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Emotet.cgci virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Expresses interest in specific running processes
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)

How to determine Backdoor.Win32.Emotet.cgci?


File Info:

crc32: B9C87960
md5: 70befd1ee9c894c0437c7e498fd4847b
name: upload_file
sha1: 98815c3f1d62b44ddb0eb8168bb7f121bc53a554
sha256: deb8de9de01322f7a866fe38fdb881ffc9e70045619e81016fd851ddd4cf837f
sha512: f0deb1c7e215d99e2252181172813f2731f84079b3af007e01745e5cc9c936ca486556091cc0f649336406dfd5a0f2359f681e2895d014c59dc1c2251c956ccb
ssdeep: 12288:GfzaBuiszJbE9mO4sl9kHAOyQkNvOzxr:GbMmO4sl9gR2Ot
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: x7248x6743x6240x6709 (C) 2002
InternalName: Pop3Monitor
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: Pop3Monitor x5e94x7528x7a0bx5e8f
ProductVersion: 1, 0, 0, 1
FileDescription: Pop3Monitor Microsoft x57fax7840x7c7bx5e94x7528x7a0bx5e8f
OriginalFilename: Pop3Monitor.EXE
Translation: 0x0804 0x04b0

Backdoor.Win32.Emotet.cgci also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKDZ.69487
FireEyeTrojan.GenericKDZ.69487
CAT-QuickHealBackdoor.Emotet
ALYacTrojan.GenericKDZ.69487
VIPRETrojan.Win32.Generic!BT
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderTrojan.GenericKDZ.69487
K7GWRiskware ( 0040eff71 )
BitDefenderThetaGen:NN.ZexaE.34186.Cq0@a49TD@gb
F-ProtW32/Emotet.AQB.gen!Eldorado
SymantecTrojan.Emotet
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Trojan.Emotet-9371545-0
KasperskyBackdoor.Win32.Emotet.cgci
AlibabaTrojan:Win32/Emotet.8b427c09
ViRobotTrojan.Win32.Emotet.458752.B
TencentMalware.Win32.Gencirc.10cde817
Ad-AwareTrojan.GenericKDZ.69487
Comodo.UnclassifiedMalware@0
F-SecureTrojan.TR/AD.Emotet.alr
DrWebTrojan.DownLoader34.24265
TrendMicroTROJ_GEN.R011C0DHG20
FortinetW32/Kryptik.HCEJ!tr
SophosTroj/Emotet-CLD
IkarusTrojan-Banker.Emotet
CyrenW32/Emotet.AQB.gen!Eldorado
JiangminBackdoor.Emotet.ra
MaxSecureTrojan.Malware.105306348.susgen
AviraTR/AD.Emotet.alr
MAXmalware (ai score=80)
Antiy-AVLTrojan[Backdoor]/Win32.Emotet
ArcabitTrojan.Generic.D10F6F
ZoneAlarmBackdoor.Win32.Emotet.cgci
MicrosoftTrojan:Win32/Emotet.ARJ!MTB
AhnLab-V3Trojan/Win32.Emotet.R347905
McAfeeRDN/Emotet
TACHYONTrojan/W32.Emotet.458752.C
VBA32BScope.Backdoor.Emotet
MalwarebytesTrojan.Emotet
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Kryptik.HFNV
TrendMicro-HouseCallTROJ_GEN.R011C0DHG20
RisingTrojan.Kryptik!1.CA7F (CLASSIC)
eGambitUnsafe.AI_Score_97%
GDataTrojan.GenericKDZ.69487
WebrootW32.Trojan.Emotet
AVGWin32:Trojan-gen
AvastWin32:Trojan-gen
CrowdStrikewin/malicious_confidence_60% (W)
Qihoo-360Generic/Trojan.9e8

How to remove Backdoor.Win32.Emotet.cgci?

Backdoor.Win32.Emotet.cgci removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment