Backdoor

About “Backdoor.Win32.Emotet.cgmg” infection

Malware Removal

The Backdoor.Win32.Emotet.cgmg is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Emotet.cgmg virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Expresses interest in specific running processes
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Attempts to modify proxy settings

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Backdoor.Win32.Emotet.cgmg?


File Info:

crc32: 8F3A56B0
md5: adf5a6fbb61297f56632e3f8217205d7
name: upload_file
sha1: 74c5f16aa1061f7747933333f35994a66e93193e
sha256: ff0b20fa6bc73c4083ec50d6525b7631a0e38e4bca2c527f6351e5bf48371968
sha512: 5e543623ba93220ab31fc44ed8ff1522397b77aafcc9b85cd79e8dbd70c94fd93a85ca7cd4f07620371f146563940f598b0c9d15ab84fedcf44da8108011eb12
ssdeep: 12288:XfzaBuiszJbE9mO4sl9kVlAOyQkNvOzxMrB:XbMmO4sl9sR2Otq
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: x7248x6743x6240x6709 (C) 2002
InternalName: Pop3Monitor
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: Pop3Monitor x5e94x7528x7a0bx5e8f
ProductVersion: 1, 0, 0, 1
FileDescription: Pop3Monitor Microsoft x57fax7840x7c7bx5e94x7528x7a0bx5e8f
OriginalFilename: Pop3Monitor.EXE
Translation: 0x0804 0x04b0

Backdoor.Win32.Emotet.cgmg also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
DrWebTrojan.DownLoader34.24265
MicroWorld-eScanTrojan.GenericKDZ.69487
ALYacTrojan.GenericKDZ.69487
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
CrowdStrikewin/malicious_confidence_60% (W)
BitDefenderTrojan.GenericKDZ.69487
K7GWRiskware ( 0040eff71 )
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderThetaGen:NN.ZexaE.34186.Cq0@ayRJbAhb
CyrenW32/Emotet.AQB.gen!Eldorado
SymantecTrojan.Emotet
TrendMicro-HouseCallTROJ_GEN.R002C0DHG20
Paloaltogeneric.ml
ClamAVWin.Trojan.Emotet-9371545-0
KasperskyBackdoor.Win32.Emotet.cgmg
AlibabaTrojan:Win32/Emotet.ab550f9a
ViRobotTrojan.Win32.Z.Emotet.458752.BLE
AegisLabTrojan.Win32.Emotet.L!c
RisingBackdoor.Emotet!8.514D (CLOUD)
Ad-AwareTrojan.GenericKDZ.69487
TACHYONTrojan/W32.Emotet.458752.C
Comodo.UnclassifiedMalware@0
F-SecureTrojan.TR/AD.Emotet.nopxf
ZillyaBackdoor.Emotet.Win32.1010
TrendMicroTROJ_GEN.R002C0DHG20
SophosTroj/Emotet-CLD
IkarusTrojan-Banker.Emotet
JiangminBackdoor.Emotet.ra
eGambitUnsafe.AI_Score_98%
AviraTR/AD.Emotet.nopxf
Antiy-AVLTrojan[Backdoor]/Win32.Emotet
MicrosoftTrojan:Win32/Emotet.ARJ!MTB
ArcabitTrojan.Generic.D10F6F
ZoneAlarmBackdoor.Win32.Emotet.cgmg
GDataTrojan.GenericKDZ.69487
AhnLab-V3Trojan/Win32.Emotet.R347905
McAfeeEmotet-FRV!ADF5A6FBB612
MAXmalware (ai score=80)
VBA32BScope.Backdoor.Emotet
MalwarebytesTrojan.Emotet
APEXMalicious
ESET-NOD32Win32/Emotet.CD
TencentMalware.Win32.Gencirc.10cde817
MaxSecureTrojan.Malware.105305952.susgen
FortinetW32/Kryptik.HCEJ!tr
WebrootW32.Trojan.Emotet
AVGWin32:Trojan-gen
PandaTrj/Genetic.gen
Qihoo-360Win32/Backdoor.e06

How to remove Backdoor.Win32.Emotet.cgmg?

Backdoor.Win32.Emotet.cgmg removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment