Backdoor

Backdoor:Win32/VB.ADA malicious file

Malware Removal

The Backdoor:Win32/VB.ADA is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor:Win32/VB.ADA virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Backdoor:Win32/VB.ADA?


File Info:

name: BC08DCB5EF1B9E3D7991.mlw
path: /opt/CAPEv2/storage/binaries/f22409e5e07d2fda56370616deff818925091d1632389a0848cd7964aabf788f
crc32: 03CF7622
md5: bc08dcb5ef1b9e3d7991c011fc8d9f15
sha1: 343806f773b1e9ed4440b735aee061000bc2cccd
sha256: f22409e5e07d2fda56370616deff818925091d1632389a0848cd7964aabf788f
sha512: 583a1c3d1cbf42b8c94b32f9a3f8c298baca341c990193f42e3c66e3193cbdbdcdd7e24e68231d1de73c94663ebc93ed701e181c1a43c2b314a03be1ed49792c
ssdeep: 6144:MvbE9jB+qXqALg8d/8d8AE/yzyfzhU/HbuTTOEdHGWUpPicL9aYZwHwjuIqXdqp1:39jpz5aO+TIOkGWULL9afbUp
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1E69423B8BD098352D8C743BAB887F69154635945DFFBCF4F4A31303805D628E6B0AE85
sha3_384: aeb85088dc631a0ec31fc32048ab2881b46154263b5d9910b45b412073e5cb6d6cfbe72f77b1ae65b4783a48fbe06f23
ep_bytes: 6880114000e8f0ffffff000000000000
timestamp: 2007-05-18 19:59:56

Version Info:

Translation: 0x0409 0x04b0
ProductName:
FileVersion: 1.00
ProductVersion: 1.00
InternalName: o t h e r
OriginalFilename: o t h e r.exe

Backdoor:Win32/VB.ADA also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Llac.lgbh
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.AYOSpy.VB.Gen
CMCGeneric.Win32.bc08dcb5ef!CMCRadar
ALYacTrojan.AYOSpy.VB.Gen
CylanceUnsafe
ZillyaTrojan.Ayolog.Win32.393
SangforSuspicious.Win32.Save.vb
K7AntiVirusTrojan ( 000126cd1 )
AlibabaBackdoor:Win32/Ayolog.72e72590
K7GWTrojan ( 000126cd1 )
CrowdStrikewin/malicious_confidence_100% (D)
CyrenW32/VB-Backdoor-Xema-based!Maxi
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.VB.NBX
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.AYOSpy.VB.Gen
NANO-AntivirusTrojan.Win32.Ayolog.krav
ViRobotTrojan.Win32.A.Ayolog.446382
AvastWin32:Ayolog-D [Trj]
TencentWin32.Trojan.Generic.Kcnw
Ad-AwareTrojan.AYOSpy.VB.Gen
SophosMal/VBDrop-G
ComodoMalware@#28lqzk5uqkvl2
DrWebTrojan.MulDrop3.24778
VIPRETrojan.AYOSpy.VB.Gen
McAfee-GW-EditionBehavesLike.Win32.VirRansom.gc
Trapminesuspicious.low.ml.score
FireEyeGeneric.mg.bc08dcb5ef1b9e3d
EmsisoftTrojan.AYOSpy.VB.Gen (B)
SentinelOneStatic AI – Malicious PE
GDataTrojan.AYOSpy.VB.Gen
JiangminTrojanSpy.Ayolog.lx
WebrootW32.Backdoor.Gen
AviraTR/Dropper.Gen
MAXmalware (ai score=99)
Antiy-AVLTrojan/Generic.ASMalwS.245
ArcabitTrojan.AYOSpy.VB.Gen
MicrosoftBackdoor:Win32/VB.ADA
GoogleDetected
Acronissuspicious
McAfeeBackDoor-DND.a.dr
VBA32Trojan.MulDrop
RisingMalware.Undefined!8.C (TFE:4:RNztzGo4peT)
YandexTrojan.GenAsa!0dunPb320Mo
IkarusTrojan-Spy.Win32.Ayolog
MaxSecureTrojan.Buzus.enfq
FortinetW32/TrojanDropper.NBX!tr
BitDefenderThetaAI:Packer.D548B43D1F
AVGWin32:Ayolog-D [Trj]
Cybereasonmalicious.5ef1b9
PandaTrj/Genetic.gen

How to remove Backdoor:Win32/VB.ADA?

Backdoor:Win32/VB.ADA removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment