Backdoor

How to remove “Backdoor.Win32.Udr.a”?

Malware Removal

The Backdoor.Win32.Udr.a is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Udr.a virus can do?

  • Sample contains Overlay data
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid

How to determine Backdoor.Win32.Udr.a?


File Info:

name: B097947C1782C847F5D3.mlw
path: /opt/CAPEv2/storage/binaries/744f33bc7b0a6bcc8e86f4ff2f539d73ac70104a054ea0787d90d1299ab6b357
crc32: 5B9F5BF0
md5: b097947c1782c847f5d320853a1fca53
sha1: 1d1ea4940772d5392fce39203c2961b21aacaf78
sha256: 744f33bc7b0a6bcc8e86f4ff2f539d73ac70104a054ea0787d90d1299ab6b357
sha512: d8cfca1179d7f12921e49cce9f43db9af501ce93cfadf0aacd843611b3e0f31892bab78bede05182b19c44a7579fc0bc4879fee0713a7cd7d784e3a036d80b3d
ssdeep: 12288:stKe6Zv23Y3L/W5L/SZdSCvTF+bDTqXTa7vuJhUauik6sAtP1TbZhP1Qv174:e6Zv2e/WNSZ8CLGETfJmaa6sAxtbZp15
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B0F423737BC2D9B2ED8744321456BB975F32F53521B62A26F3E05B262C31E10AF85B06
sha3_384: 96484601deacea136d873d8396932170d77ddf265d89980318f367f44fe5507970a472f8ba9a14682367ccb2d2b90758
ep_bytes: 5589e5535683ec4855b8ffffffff5050
timestamp: 2003-12-14 15:57:12

Version Info:

CompanyName: Microsoft Corporation
FileDescription: Generic Host Process for Win32 Services
FileVersion: 5.1.2600.0
InternalName: svchost.exe
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFilename: svchost.exe
ProductName: Microsoft® Windows® Operating System
ProductVersion: 5.1.2600.0
Translation: 0x0409 0x04b0

Backdoor.Win32.Udr.a also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Udr.tnq4
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.GenericKDZ.94503
CAT-QuickHealTrojan.Malex.AA11
ALYacTrojan.GenericKDZ.94503
MalwarebytesGeneric.Malware.AI.DDS
VIPRETrojan.GenericKDZ.94503
SangforSuspicious.Win32.Save.ins
K7AntiVirusTrojan ( 0002abb91 )
AlibabaBackdoor:Win32/Malex.47fb682d
K7GWTrojan ( 0002abb91 )
Cybereasonmalicious.40772d
BaiduWin32.Trojan.Agent.ff
VirITTrojan.Win32.Generic.SKE
CyrenW32/Agent.ASF.gen!Eldorado
SymantecSMG.Heur!gen
Elasticmalicious (high confidence)
APEXMalicious
ClamAVWin.Trojan.Ulise-10005646-0
KasperskyBackdoor.Win32.Udr.a
BitDefenderTrojan.GenericKDZ.94503
AvastOther:Malware-gen [Trj]
TencentBackdoor.Win32.Udr.aa
EmsisoftTrojan.GenericKDZ.94503 (B)
DrWebBackDoor.Udr.1
ZillyaBackdoor.Udr.Win32.3
McAfee-GW-EditionBehavesLike.Win32.Backdoor.bc
FireEyeTrojan.GenericKDZ.94503
SophosTroj/Malex-AI
SentinelOneStatic AI – Malicious PE
GDataTrojan.GenericKDZ.94503
JiangminBackdoor/Udr.a
GoogleDetected
Antiy-AVLTrojan[Backdoor]/Win32.Udr.a
XcitiumBackdoor.Win32.Agent.~APN@4u0v7
ArcabitTrojan.Generic.D17127
ViRobotBackdoor.Win32.A.Udr.77563
ZoneAlarmBackdoor.Win32.Udr.a
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
AhnLab-V3Backdoor/Win32.Udr.R233673
McAfeeBackDoor-DSA
MAXmalware (ai score=83)
Cylanceunsafe
PandaTrj/CI.A
RisingBackdoor.Udr!1.65B3 (CLASSIC)
YandexTrojan.Malex.Gen.1
IkarusBackdoor.Win32.Udr
MaxSecureBackdoor.W32.Udr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Backdoor.Win32.Udr.a?

Backdoor.Win32.Udr.a removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment