Backdoor

Backdoor:Win32/Venik!pz removal tips

Malware Removal

The Backdoor:Win32/Venik!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor:Win32/Venik!pz virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • HTTPS urls from behavior.
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • A ping command was executed with the -n argument possibly to delay analysis
  • Checks for the presence of known devices from debuggers and forensic tools
  • Checks for the presence of known devices from debuggers and forensic tools
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempted to write directly to a physical drive
  • Attempts to modify proxy settings
  • Deletes executed files from disk
  • Touches a file containing cookies, possibly for information gathering
  • Anomalous binary characteristics

How to determine Backdoor:Win32/Venik!pz?


File Info:

name: CC47395755AACEC09BC8.mlw
path: /opt/CAPEv2/storage/binaries/bea60618739b519a2dd1cfe6a05574843406e09b7d65c7c55621d6b579fe29b7
crc32: A3483734
md5: cc47395755aacec09bc86eea667c4ea6
sha1: 1e43541de316f5df9c0c3db0ee930ff42d30cdbc
sha256: bea60618739b519a2dd1cfe6a05574843406e09b7d65c7c55621d6b579fe29b7
sha512: d6a19d88100267ebbfaa3bed38fba35946cdba7527b3f3b77f0a42a5d67362672ec4df204e82feef6efe2839000ca3df1a0bd3e32fb56c1de986d105553fe36d
ssdeep: 6144:cK+/nRMYrp2wrPHRYz9fa3/Y1R6vNLdYoz:+RMczHRipaQrK
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T13D341208D64B0902E31F03B20D5F7A711039976C9CB8E367DB0D95788ECAB7A69637E1
sha3_384: e6d69b949e25b8078e9efbe08e9bbec1731afc9375a0638ab5ecc693018cc7dc392415d9325d91b4fa5e0e0f0aee3c71
ep_bytes: 60e8000000005d81ed0600000064a023
timestamp: 2015-12-02 08:52:30

Version Info:

0: [No Data]

Backdoor:Win32/Venik!pz also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Generic.l4ql
CynetMalicious (score: 100)
SkyhighBehavesLike.Win32.Generic.dc
McAfeeArtemis!CC47395755AA
Cylanceunsafe
VIPREGen:Packer.RLPack.A.oi1@ayMMVEgi
SangforSuspicious.Win32.Save.ins
K7AntiVirusTrojan ( 005376ae1 )
BitDefenderGen:Packer.RLPack.A.oi1@ayMMVEgi
K7GWTrojan ( 005376ae1 )
CrowdStrikewin/malicious_confidence_100% (W)
ArcabitGen:Packer.RLPack.A.EA8CBE
SymantecSMG.Heur!gen
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Farfli.BWM
APEXMalicious
ClamAVWin.Dropper.Gh0stRAT-7414189-0
KasperskyP2P-Worm.Win32.Palevo.hyoa
MicroWorld-eScanGen:Packer.RLPack.A.oi1@ayMMVEgi
RisingWorm.Palevo!8.171 (CLOUD)
EmsisoftGen:Packer.RLPack.A.oi1@ayMMVEgi (B)
F-SecureTrojan.TR/Patched.Gen
DrWebTrojan.DownLoader17.62076
ZillyaAdware.OutBrowse.Win32.80955
TrendMicroBKDR_VENIK_EL1501C5.UVPM
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.cc47395755aacec0
SophosTroj/Venik-AH
SentinelOneStatic AI – Malicious PE
JiangminWorm.Palevo.ano
VaristW32/Patched.J.gen!Eldorado
AviraTR/Patched.Gen
Antiy-AVLTrojan/Win32.AGeneric
Kingsoftmalware.kb.b.996
MicrosoftBackdoor:Win32/Venik!pz
ZoneAlarmP2P-Worm.Win32.Palevo.hyoa
GDataWin32.Trojan.PSE.WTDIFU
GoogleDetected
AhnLab-V3Dropper/Win32.Banki.C1308837
Acronissuspicious
ALYacGen:Packer.RLPack.A.oi1@ayMMVEgi
MAXmalware (ai score=84)
DeepInstinctMALICIOUS
VBA32Worm.Palevo
MalwarebytesGeneric.Malware.AI.DDS
TrendMicro-HouseCallBKDR_VENIK_EL1501C5.UVPM
TencentP2P-Worm.Win32.Palevo.hj
YandexWorm.P2P.Palevo!BNZ0VQdyLF4
IkarusBackdoor.Rbot
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Farfli.BTY!tr
BitDefenderThetaAI:Packer.12D50C1A1C
AVGWin32:Evo-gen [Trj]
Cybereasonmalicious.755aac
AvastWin32:Evo-gen [Trj]
alibabacloudWorm:Win/Farfli.34c274db

How to remove Backdoor:Win32/Venik!pz?

Backdoor:Win32/Venik!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment