Backdoor

Backdoor:Win32/Berbew!pz malicious file

Malware Removal

The Backdoor:Win32/Berbew!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor:Win32/Berbew!pz virus can do?

  • Sample contains Overlay data
  • Creates an indicator observed in Territorial Disputes report SIG40
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Anomalous binary characteristics
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Backdoor:Win32/Berbew!pz?


File Info:

name: A46DA8E282FB264BC767.mlw
path: /opt/CAPEv2/storage/binaries/d02559b9df77f36476ab65aa1af6bb2e9899df6cc23905fc1d4052ccc86916f0
crc32: 3922ED63
md5: a46da8e282fb264bc76760aca9474356
sha1: e319b8302004b2928e1548ffb722f77eeb361f17
sha256: d02559b9df77f36476ab65aa1af6bb2e9899df6cc23905fc1d4052ccc86916f0
sha512: 6b956ebc02448f8d01deb146d62bc5128592140813b8f29b5cd29cda926fc246c3749c9fcc3f147e402bfd673e454b43c0e40ffb70cd3635747e3cb881e5e123
ssdeep: 6144:HpTwxmqkV6SnE8eYr75lHzpaF2e6UK+42GTQMJSZO5f7M0rx7/hP66qve6UK+42A:H2N8eYr75lTefkY660fIaDZkY660f2lO
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T170847B07F1A15E61C65300FD230D9F673EEA332CDDEAE16188E6814ED6A3AC54F63192
sha3_384: aefbe51bc92bb5fe03e2018f111038bdc3fb308d2d07726217c4bcb7d1a38a22cb94ba507aa797c1f93a92ab087c63ab
ep_bytes: 90909090609067e80000000090905890
timestamp: 1987-08-01 05:39:38

Version Info:

0: [No Data]

Backdoor:Win32/Berbew!pz also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKDZ.102778
FireEyeGeneric.mg.a46da8e282fb264b
CAT-QuickHealTrojan.GenericIH.S13286062
SkyhighBehavesLike.Win32.Backdoor.fc
McAfeeTrojan-FVOK!A46DA8E282FB
Cylanceunsafe
VIPRETrojan.GenericKDZ.102778
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005780dd1 )
BitDefenderTrojan.GenericKDZ.102778
K7GWTrojan ( 005780dd1 )
Cybereasonmalicious.02004b
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Padodor.AB
APEXMalicious
ClamAVWin.Trojan.Crypted-29
KasperskyBackdoor.Win32.Padodor.gen
NANO-AntivirusTrojan.Win32.Padodor.kaakfa
RisingRansom.PornoAsset!8.6AA (TFE:2:KsanTfOGiFQ)
EmsisoftTrojan.GenericKDZ.102778 (B)
F-SecureTrojan.TR/Crypt.XDR.Gen
DrWebBackDoor.Wdozer
ZillyaTrojan.Padodor.Win32.1614836
TrendMicroTROJ_GEN.R03BC0DJO23
Trapminemalicious.high.ml.score
SophosTroj/Padodo-Gen
SentinelOneStatic AI – Malicious PE
MAXmalware (ai score=87)
JiangminBackdoor.Padodor.erlj
GoogleDetected
AviraTR/Crypt.XDR.Gen
VaristW32/Backdoor.DKIC-2994
Antiy-AVLTrojan[Proxy]/Win32.Qukart.gen
Kingsoftmalware.kb.a.1000
MicrosoftBackdoor:Win32/Berbew!pz
ArcabitTrojan.Generic.D1917A
ZoneAlarmBackdoor.Win32.Padodor.gen
GDataWin32.Trojan.PSE.6Y5R0K
CynetMalicious (score: 100)
AhnLab-V3Win-Trojan/Berbew.51712
Acronissuspicious
VBA32Backdoor.Padodor
ALYacTrojan.GenericKDZ.102778
TACHYONBackdoor/W32.Padodor
DeepInstinctMALICIOUS
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R03BC0DJO23
TencentBackdoor.Win32.Padodor.kl
IkarusTrojan.Crypt
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Qukart.A!tr
BitDefenderThetaAI:Packer.AA3F802121
AVGWin32:Padodor-V [Trj]
AvastWin32:Padodor-V [Trj]
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Backdoor:Win32/Berbew!pz?

Backdoor:Win32/Berbew!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment