Backdoor

Should I remove “Backdoor.Win32.Emotet.cgsh”?

Malware Removal

The Backdoor.Win32.Emotet.cgsh is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Emotet.cgsh virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Expresses interest in specific running processes
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)

How to determine Backdoor.Win32.Emotet.cgsh?


File Info:

crc32: 7A588320
md5: e2fc6217ce1809b24c93113fa854339b
name: upload_file
sha1: 7ad470aa18c34f75028e74dd838a06a6aa4690c9
sha256: b0bd65c7a39c26769462f4e5ac573a6c76fa7097ebb9e53b76adf64976ef7e91
sha512: 47dbab493891fee7ee45ae8fe546cf0d25360cdc123e2a2938ef7a3b3e88ef3bdf4afd1194e8f1307742e189c9fc8ec350b1c7b0df7e054e10b8e861c3013013
ssdeep: 12288:rfzaBuiszJbE9mO4sl9kVlAOyQkNvOzxo0:rbMmO4sl9sR2Ot/
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: x7248x6743x6240x6709 (C) 2002
InternalName: Pop3Monitor
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: Pop3Monitor x5e94x7528x7a0bx5e8f
ProductVersion: 1, 0, 0, 1
FileDescription: Pop3Monitor Microsoft x57fax7840x7c7bx5e94x7528x7a0bx5e8f
OriginalFilename: Pop3Monitor.EXE
Translation: 0x0804 0x04b0

Backdoor.Win32.Emotet.cgsh also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKDZ.69487
FireEyeTrojan.GenericKDZ.69487
McAfeeGenericRXLR-TI!E2FC6217CE18
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.Emotet.L!c
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderTrojan.GenericKDZ.69487
K7GWRiskware ( 0040eff71 )
TrendMicroTrojanSpy.Win32.EMOTET.THHAFBO
CyrenW32/Emotet.AQB.gen!Eldorado
SymantecTrojan.Emotet
APEXMalicious
AvastWin32:Trojan-gen
ClamAVWin.Trojan.Emotet-9371544-0
KasperskyBackdoor.Win32.Emotet.cgsh
AlibabaTrojan:Win32/Emotet.c5b877b8
ViRobotTrojan.Win32.Z.Emotet.458752.CWZ
RisingTrojan.GenKryptik!8.AA55 (CLOUD)
Ad-AwareTrojan.GenericKDZ.69487
Comodo.UnclassifiedMalware@0
F-SecureTrojan.TR/Kryptik.vmfwx
DrWebTrojan.DownLoader34.24265
ZillyaBackdoor.Emotet.Win32.1010
SophosTroj/Emotet-CLD
IkarusTrojan-Banker.Emotet
JiangminBackdoor.Emotet.ra
WebrootW32.Trojan.Emotet
AviraTR/Kryptik.vmfwx
MAXmalware (ai score=86)
Antiy-AVLTrojan[Backdoor]/Win32.Emotet
MicrosoftTrojan:Win32/Emotet.ARJ!MTB
ArcabitTrojan.Generic.D10F6F
ZoneAlarmBackdoor.Win32.Emotet.cgsh
GDataTrojan.GenericKDZ.69487
AhnLab-V3Trojan/Win32.Emotet.R347905
BitDefenderThetaGen:NN.ZexaF.34186.Cq0@a4FH3llb
ALYacTrojan.GenericKDZ.69487
TACHYONTrojan/W32.Emotet.458752.C
VBA32BScope.Backdoor.Emotet
MalwarebytesTrojan.Emotet
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Kryptik.HFNV
TrendMicro-HouseCallTrojanSpy.Win32.EMOTET.THHAFBO
TencentMalware.Win32.Gencirc.10cde817
eGambitUnsafe.AI_Score_97%
FortinetW32/Kryptik.HCEJ!tr
AVGWin32:Trojan-gen
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_60% (W)

How to remove Backdoor.Win32.Emotet.cgsh?

Backdoor.Win32.Emotet.cgsh removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment