Backdoor

Backdoor:Win32/Berbew!pz removal guide

Malware Removal

The Backdoor:Win32/Berbew!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor:Win32/Berbew!pz virus can do?

  • Sample contains Overlay data
  • Creates an indicator observed in Territorial Disputes report SIG40
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Anomalous binary characteristics
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Backdoor:Win32/Berbew!pz?


File Info:

name: 81666EA3E928D1CDBCCE.mlw
path: /opt/CAPEv2/storage/binaries/66ac610a6da223033d4524ccf548fa7d4a59db57f3b801803462df03fbdfe870
crc32: 5AF18225
md5: 81666ea3e928d1cdbcce880f8c88a670
sha1: bff73e0251c1248d02e2c432f7db37fb0e60f2e2
sha256: 66ac610a6da223033d4524ccf548fa7d4a59db57f3b801803462df03fbdfe870
sha512: 7caa3cd5b5b4bae77247c36f6738895faf6f6e538274525c77abd5d479e279937a24ffa49161324cb26458f0974b1a84e17f519b876740decf44f4d73c8d6fcd
ssdeep: 6144:5VBrsis/9EJeYr75lHzpaF2e6UK+42GTQMJSZO5f7M0rx7/hP66qve6UK+42GTQ+:5VB2GJeYr75lTefkY660fIaDZkY660fR
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T130848C0BB2650EE1C6D3017D700D8F563EE7622CD5EAD12219E681DFEA17AC94F670A3
sha3_384: 43bc0580994bd9e53465934b4fbddf5f1b26661c7d6047c21a927d38517fe64ea232eeadb80a817e295b84e9b75db383
ep_bytes: 90909090906067e80000000058909090
timestamp: 1987-08-01 05:39:38

Version Info:

0: [No Data]

Backdoor:Win32/Berbew!pz also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKDZ.102778
CAT-QuickHealTrojan.GenericIH.S13286062
SkyhighBehavesLike.Win32.Backdoor.fc
McAfeeGenericRXPE-AP!BC9FA6E42036
MalwarebytesGeneric.Malware.AI.DDS
VIPRETrojan.GenericKDZ.102778
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005780dd1 )
BitDefenderTrojan.GenericKDZ.102778
K7GWTrojan ( 005780dd1 )
Cybereasonmalicious.251c12
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Padodor.AB
APEXMalicious
ClamAVWin.Trojan.Crypted-31
KasperskyBackdoor.Win32.Padodor.gen
NANO-AntivirusTrojan.Win32.Padodor.jwmvif
RisingBackdoor.Berbew!8.115 (TFE:2:ljEeaTdblGT)
TACHYONBackdoor/W32.Padodor
SophosTroj/Padodo-Gen
F-SecureTrojan.TR/Crypt.XDR.Gen
DrWebBackDoor.Wdozer
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.81666ea3e928d1cd
EmsisoftTrojan.GenericKDZ.102778 (B)
IkarusTrojan.Crypt
JiangminBackdoor.Padodor.erlj
GoogleDetected
AviraTR/Crypt.XDR.Gen
VaristW32/Backdoor.DKIC-2994
Antiy-AVLTrojan[Proxy]/Win32.Qukart.gen
Kingsoftmalware.kb.a.1000
MicrosoftBackdoor:Win32/Berbew!pz
ArcabitTrojan.Generic.D1917A
ZoneAlarmBackdoor.Win32.Padodor.gen
GDataWin32.Trojan.PSE.6Y5R0K
CynetMalicious (score: 100)
AhnLab-V3Win-Trojan/Berbew.51712
Acronissuspicious
BitDefenderThetaAI:Packer.AA3F802121
ALYacTrojan.GenericKDZ.102778
MAXmalware (ai score=87)
DeepInstinctMALICIOUS
VBA32Backdoor.Padodor
Cylanceunsafe
PandaTrj/Genetic.gen
TencentBackdoor.Win32.Padodor.kl
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Qukart.A!tr
AVGWin32:Padodor-V [Trj]
AvastWin32:Padodor-V [Trj]
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Backdoor:Win32/Berbew!pz?

Backdoor:Win32/Berbew!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment