Backdoor

BScope.Backdoor.Kuluoz removal instruction

Malware Removal

The BScope.Backdoor.Kuluoz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What BScope.Backdoor.Kuluoz virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • CAPE extracted potentially suspicious content
  • Unconventionial binary language: Russian
  • Unconventionial language used in binary resources: Indonesian
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Behavior consistent with a dropper attempting to download the next stage.
  • Attempts to modify proxy settings

How to determine BScope.Backdoor.Kuluoz?


File Info:

name: AD7D9B5AC99DC3755935.mlw
path: /opt/CAPEv2/storage/binaries/412a1fa4481e89d2f6eb0d18d024aa21669e1db064a53320bb39413ffe45af9d
crc32: FA881AC2
md5: ad7d9b5ac99dc3755935066a15a72af9
sha1: 591612f8216735fd82d970879833e7adebe7ae64
sha256: 412a1fa4481e89d2f6eb0d18d024aa21669e1db064a53320bb39413ffe45af9d
sha512: a571b982367f38443207030a0f2555d71921bc9407121488a4ccf278fffb84f8adca886177d7fe33d3583f7836e9717967fb553875667f385bb411255a836283
ssdeep: 1536:Ev+1ajg59V5VsPW7AvosJe8k8hkKGCGL2+AbyTWOGIaNWU1CE1HMwnVdfevQ:A+4gru+7Avo/usFq+UCW1IagEiwnVQQ
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1F444C34FB97C5424D017E0B42A5789E302ABBA34537988D7A3AF7C69477FE307224786
sha3_384: c28a5b792213198ae6941429d03264fd06c29c452a9ab84097e51473c1b06616428092cf0ecbc9a222cd67e79f27e178
ep_bytes: 558bec81ec98000000e8d2f7ffffa100
timestamp: 2014-02-03 13:21:28

Version Info:

CompanyName: Корпорация Майкрософт
FileDescription: Назначенные задания
FileVersion: 5.1.2600.5512 (xpsp.080413-2108)
Translation: 0x0419 0x04b0

BScope.Backdoor.Kuluoz also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
DrWebBackDoor.Kuluoz.4
ClamAVWin.Trojan.Zbot-62543
FireEyeGeneric.mg.ad7d9b5ac99dc375
CAT-QuickHealTrojanDownloader.Kuluoz.D3
ALYacTrojan.Cridex.Gen.1
CylanceUnsafe
ZillyaBackdoor.Androm.Win32.5998
SangforTrojan.Win32.Save.a
K7AntiVirusBackdoor ( 0040f7921 )
AlibabaTrojanDropper:Win32/dropper.ali1003001
K7GWBackdoor ( 0040f7921 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZexaF.34182.pu0@aWSbQOgI
VirITBackdoor.Win32.Kuluoz.E
CyrenW32/Zbot.JC.gen!Eldorado
SymantecPacked.Generic.459
ESET-NOD32Win32/TrojanDownloader.Zortob.B
TrendMicro-HouseCallTROJ_KULUOZ.SMC
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Cridex.Gen.1
NANO-AntivirusTrojan.Win32.Androm.ctbwrc
SUPERAntiSpywareTrojan.Agent/Gen-Kuluoz
MicroWorld-eScanTrojan.Cridex.Gen.1
TencentTrojan.Win32.DL.acm
Ad-AwareTrojan.Cridex.Gen.1
EmsisoftTrojan.Cridex.Gen.1 (B)
ComodoBackdoor.Win32.Androm.BMUN@57ci6u
VIPRETrojan.Win32.Kuluoz.bb (v)
TrendMicroTROJ_KULUOZ.SMC
McAfee-GW-EditionPacked-AM!AD7D9B5AC99D
SophosMal/Generic-R + Troj/Agent-AFXS
IkarusTrojan.Crypt3
GDataTrojan.Cridex.Gen.1
JiangminTrojan.Generic.dwjcd
WebrootTrojan.Fakealert.Gen
AviraBDS/Androm.xadx.1
MAXmalware (ai score=100)
Antiy-AVLTrojan/Generic.ASMalwS.7E6C5C
KingsoftWin32.Hack.Androm.bm.(kcloud)
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftTrojanDownloader:Win32/Kuluoz.D
AhnLab-V3Win-Trojan/Bublik.257536
Acronissuspicious
McAfeeBackdoor-FBRL
TACHYONBackdoor/W32.Androm.257536.B
VBA32BScope.Backdoor.Kuluoz
MalwarebytesBackdoor.Andromeda
PandaTrj/Genetic.gen
APEXMalicious
RisingTrojan.Win32.Generic.1673025A (C64:YzY0OmxxK9kICVmE)
YandexBackdoor.Androm!01XFD0ojmS8
SentinelOneStatic AI – Malicious PE
FortinetW32/GenKryptik.ATAM!tr
AVGWin32:BackdoorX-gen [Trj]
Cybereasonmalicious.ac99dc
AvastWin32:BackdoorX-gen [Trj]
MaxSecureTrojan.Malware.300983.susgen

How to remove BScope.Backdoor.Kuluoz?

BScope.Backdoor.Kuluoz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment