Backdoor

Backdoor.Win32.TeviRat.jl removal

Malware Removal

The Backdoor.Win32.TeviRat.jl is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.TeviRat.jl virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Likely virus infection of existing system binary

How to determine Backdoor.Win32.TeviRat.jl?


File Info:

name: 5E31BE254253D2E2B106.mlw
path: /opt/CAPEv2/storage/binaries/fb9d7cf8e75b80c351bd15961f3bd364856484b510e8fc1c5dba9c583025426c
crc32: 412E0072
md5: 5e31be254253d2e2b106de8519e0f266
sha1: 99bfec5800939ccead91c91298c36076f09d26c3
sha256: fb9d7cf8e75b80c351bd15961f3bd364856484b510e8fc1c5dba9c583025426c
sha512: 72b5a6aa1b7c5a6929cac0e470d849f8d23e52fc3b4c4520f6119df4f903d6ee57ba7705affd2003cf266ff676ee5fce5b18993c5565784fcc267221bfc766af
ssdeep: 49152:TcsQ6QEWhZq9kEl9/fb+8vfdu2P8TWtQZC4k0Y4QGIPLONkPGB:T1QTEYZq9kED+8ns2LWCZD9z4UO
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T186D50127B299A53EC4AE2B350673A15058FBB66DF417BE1637F4C48CCF260C01E3A665
sha3_384: c655ce3c20e01f066ddf69ea64dbe8a3fc93d8a47bccc8c4f751db8ac101318c4017780b9307d5ccbff6da47d1d45adb
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2021-07-22 05:43:38

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: Cat Logic
FileDescription: CatList Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: CatList
ProductVersion: 0.8.0.5
Translation: 0x0000 0x04b0

Backdoor.Win32.TeviRat.jl also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.TeviRat.m!c
MicroWorld-eScanGen:Variant.Adware.Cerbu.74725
FireEyeGen:Variant.Adware.Cerbu.74725
McAfeeArtemis!5E31BE254253
MalwarebytesAdware.DownloadAssistant
K7AntiVirusTrojan ( 0057e05e1 )
AlibabaBackdoor:Win32/TeviRat.d1dd75fe
K7GWTrojan ( 0057e05e1 )
CyrenW32/Addrop.K.gen!Eldorado
SymantecTrojan.Gen.MBT
ESET-NOD32Win32/TrojanDropper.Addrop.DH
TrendMicro-HouseCallTROJ_GEN.R002C0WKT21
KasperskyBackdoor.Win32.TeviRat.jl
BitDefenderGen:Variant.Adware.Cerbu.74725
AvastWin32:Trojan-gen
Ad-AwareGen:Variant.Adware.Cerbu.74725
EmsisoftGen:Variant.Adware.Cerbu.74725 (B)
TrendMicroTROJ_GEN.R002C0WKT21
McAfee-GW-EditionBehavesLike.Win32.CSDImonetize.vc
SophosMal/Generic-S
IkarusTrojan-Dropper.Win32.Addrop
GDataGen:Variant.Adware.Cerbu.74725
AviraHEUR/AGEN.1143627
GridinsoftRansom.Win32.Wacatac.sa
ViRobotTrojan.Win32.Z.Addrop.3012825
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Trojan-gen.C4784191
VBA32Backdoor.TeviRat
ALYacGen:Variant.Adware.Cerbu.74725
MAXmalware (ai score=61)
APEXMalicious
FortinetW32/Addrop.DH!tr
AVGWin32:Trojan-gen

How to remove Backdoor.Win32.TeviRat.jl?

Backdoor.Win32.TeviRat.jl removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment