Backdoor

About “Backdoor:Win32/Meciv.A” infection

Malware Removal

The Backdoor:Win32/Meciv.A is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor:Win32/Meciv.A virus can do?

  • HTTPS urls from behavior.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Anomalous binary characteristics

How to determine Backdoor:Win32/Meciv.A?


File Info:

name: 140C69EA9A963100E754.mlw
path: /opt/CAPEv2/storage/binaries/c2135ccc8a46d4bda7b6052df92035a134b83b8f78b8ba078621d537db021bc7
crc32: 19CF9DFD
md5: 140c69ea9a963100e75497b33820f1da
sha1: 1124f1815fd9ac486af884910f1057f74c77de1e
sha256: c2135ccc8a46d4bda7b6052df92035a134b83b8f78b8ba078621d537db021bc7
sha512: 6996528d9e4b649162fafb351e111720786b1b0eb6676a0a49af73c86ed3ade9f8363935860dad509177f8fa1ade1d668ced59f05a7b408b94b2fbc4aa7625f4
ssdeep: 1536:u6CQzj4GgIrtxTilfnblH4uBqkqK+L95uo:gQPDuxlDX+L95l
type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
tlsh: T199638D007641D237C9465038B12AE7B25B7EB93019F4C947BB931BAE8F712D1F12A39B
sha3_384: 20bc67d57c4f04fc80fbf1f92c7671d2bf34dc6adf917e9bf16333db232dda670682b8f84319b408599224bfc2f59cf8
ep_bytes: 8bff558bec837d0c017505e8f3390000
timestamp: 2011-04-26 09:08:59

Version Info:

0: [No Data]

Backdoor:Win32/Meciv.A also known as:

LionicTrojan.Win32.Agent.lw50
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Application.Keylogger.WebWatcher.82
ClamAVWin.Trojan.Enfal-100
FireEyeGeneric.mg.140c69ea9a963100
SkyhighBehavesLike.Win32.Dropper.kh
McAfeeGenericRXFD-RF!140C69EA9A96
MalwarebytesMalware.AI.2032304419
ZillyaBackdoor.Agent.Win32.31692
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 004e68fc1 )
AlibabaBackdoor:Win32/Meciv.71246300
K7GWTrojan ( 004e68fc1 )
CrowdStrikewin/malicious_confidence_90% (D)
BitDefenderThetaGen:NN.ZedlaF.36744.eu4@aKQtR9pi
VirITBackdoor.Win32.Agent.AKYX
SymantecBackdoor.Samkams!gen
ESET-NOD32a variant of Win32/Pucedoor.A
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Application.Keylogger.WebWatcher.82
NANO-AntivirusTrojan.Win32.Agent.cxzie
AvastWin32:BackdoorX-gen [Trj]
TACHYONBackdoor/W32.Meciv.70144.B
SophosMal/Generic-S
F-SecureTrojan.TR/ATRAPS.Gen
DrWebBackDoor.Siggen.29494
VIPREGen:Variant.Application.Keylogger.WebWatcher.82
TrendMicroBKDR_MECIV.SME
EmsisoftGen:Variant.Application.Keylogger.WebWatcher.82 (B)
IkarusTrojan-Dropper.Agent
GDataGen:Variant.Application.Keylogger.WebWatcher.82
JiangminBackdoor/Agent.cpvg
WebrootW32.Backdoor.Gen
VaristW32/Meciv.B.gen!Eldorado
AviraTR/ATRAPS.Gen
Antiy-AVLTrojan[APT]/Win32.Sindigoo
XcitiumTrojWare.Win32.Trojan.XPack.~gen1@1rwlif
ArcabitTrojan.Application.Keylogger.WebWatcher.82
ViRobotBackdoor.Win32.A.Agent.70144.C
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftBackdoor:Win32/Meciv.A
GoogleDetected
AhnLab-V3Backdoor/Win32.Agent.R5941
ALYacGen:Variant.Application.Keylogger.WebWatcher.82
MAXmalware (ai score=100)
VBA32Backdoor.Agent
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallBKDR_MECIV.SME
RisingBackdoor.Meciv!8.1C10 (TFE:5:CfW4VOesWpI)
YandexBackdoor.Agent!y4trumgKSek
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.2257677.susgen
FortinetW32/Agent.BG!tr
AVGWin32:BackdoorX-gen [Trj]
DeepInstinctMALICIOUS

How to remove Backdoor:Win32/Meciv.A?

Backdoor:Win32/Meciv.A removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment