Backdoor

Backdoor:Win32/Berbew!pz removal guide

Malware Removal

The Backdoor:Win32/Berbew!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor:Win32/Berbew!pz virus can do?

  • Sample contains Overlay data
  • Creates an indicator observed in Territorial Disputes report SIG40
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Anomalous binary characteristics
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Backdoor:Win32/Berbew!pz?


File Info:

name: 56887F2E4D46AF292B08.mlw
path: /opt/CAPEv2/storage/binaries/562461db706b33f0c7ee65ed76614eb3ac3a0f74e2e17295cb7d3040825676bf
crc32: E200ED33
md5: 56887f2e4d46af292b08e392b899456e
sha1: e50252d80fd7cdbfe9afe85551dc339fb0fba5b8
sha256: 562461db706b33f0c7ee65ed76614eb3ac3a0f74e2e17295cb7d3040825676bf
sha512: 0c0d3a3e9085578f0d41d07b4207afe8e860412d3d1d1f4d07d676da05cfa181c737dd642b7ae6913caa594d729488e28330424a0286ffffb785dbb89d50d1a3
ssdeep: 3072:v0ZsLWZvL1r8IAtco4D55iU4Sp+7H7wWkqrifbdB7dYk1Bx8DpsV6OzrR:v0ZsaZT1gTq1N5iUBOHhkym/89b0
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T13E145A1E62C40FF2F65432308D4553536A13D72AF96F9323DEC5B40E3E9AA60A5E9E31
sha3_384: c738c6ba00f0bf9295ad058fde1b71cad59236da5c8269cc0e7bc66960bc71b027c30ce48dbc02c57eba8e77a9129711
ep_bytes: 9067e800000000909058909090900563
timestamp: 1987-08-01 05:39:38

Version Info:

0: [No Data]

Backdoor:Win32/Berbew!pz also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
DrWebBackDoor.Wdozer
MicroWorld-eScanGen:Trojan.ShellObject.mWZ@aeFgVVo
ClamAVWin.Trojan.Obfus-38
CAT-QuickHealTrojan.GenericIH.S13286062
SkyhighBehavesLike.Win32.Generic.ch
McAfeeGenericRXPE-AP!5A5D2946966B
MalwarebytesGeneric.Malware.AI.DDS
VIPREGen:Trojan.ShellObject.mWZ@aeFgVVo
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005780dd1 )
K7GWTrojan ( 005780dd1 )
CrowdStrikewin/malicious_confidence_100% (D)
ArcabitTrojan.ShellObject.E33FF2
BitDefenderThetaAI:Packer.20D60B8521
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32Win32/Padodor.AB
APEXMalicious
CynetMalicious (score: 100)
KasperskyBackdoor.Win32.Padodor.gen
BitDefenderGen:Trojan.ShellObject.mWZ@aeFgVVo
NANO-AntivirusTrojan.Win32.Padodor.jxocvg
AvastWin32:Padodor-V [Trj]
TencentBackdoor.Win32.Padodor.kp
EmsisoftGen:Trojan.ShellObject.mWZ@aeFgVVo (B)
F-SecureTrojan.TR/Crypt.XDR.Gen
SophosMal/Padodor-A
IkarusBackdoor.Win32.Padodor
JiangminBackdoor.Padodor.exys
GoogleDetected
AviraTR/Crypt.XDR.Gen
MAXmalware (ai score=80)
Antiy-AVLTrojan[Proxy]/Win32.Qukart.gen
Kingsoftmalware.kb.a.1000
MicrosoftBackdoor:Win32/Berbew!pz
ZoneAlarmBackdoor.Win32.Padodor.gen
GDataGen:Trojan.ShellObject.mWZ@aeFgVVo
VaristW32/Backdoor.DKIC-2994
AhnLab-V3Win-Trojan/Berbew.51712
Acronissuspicious
VBA32Backdoor.Padodor
TACHYONBackdoor/W32.Padodor
Cylanceunsafe
PandaTrj/Genetic.gen
RisingBackdoor.Padodor!8.118 (TFE:5:fgpvVm3eZVO)
YandexTrojan.GenAsa!p1fO5hhCx5A
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Agent.B077!tr
AVGWin32:Padodor-V [Trj]
Cybereasonmalicious.80fd7c
DeepInstinctMALICIOUS

How to remove Backdoor:Win32/Berbew!pz?

Backdoor:Win32/Berbew!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment