Malware

What is “Bulz.200270”?

Malware Removal

The Bulz.200270 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Bulz.200270 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Attempts to modify desktop wallpaper
  • Attempts to identify installed AV products by installation directory

How to determine Bulz.200270?


File Info:

name: 5B0A6A6BD0BBEC5C742C.mlw
path: /opt/CAPEv2/storage/binaries/2f00f8ea4e76a03101745e45b4bf787ad5c47f946e9446f9f946c0cea76ecc86
crc32: 6F26E078
md5: 5b0a6a6bd0bbec5c742c4e86062aab3f
sha1: edba17e6529d946305fdf6540ce2516a84d7de80
sha256: 2f00f8ea4e76a03101745e45b4bf787ad5c47f946e9446f9f946c0cea76ecc86
sha512: 5d81568c2d7caa9b7fbe8e2a257eb53c2eff61c5abda977d70ad77cd8fe579385bf8f678796bb60cb60da7ecb50198478490bea892eb3ac736ae3ba856a7ecfd
ssdeep: 196608:lH5HoX8agASkppHxfxtbO2MbXF56IdYvtphqlKxYF6GgsV45/T0p3xk:lloX8agAVxZtGeyYvv+AGgN/I7k
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T119B612AB3264D13FD9BA4A31C572A2F069377F52D4094C6B17E0BD48FB721600E7AA17
sha3_384: b44d93ad2176826c5c87515617adb15542fdc34d974c831f35db1b3e867e5855e21e17f195deca053bc7bceee2a8a88b
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2020-05-21 05:56:23

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: Online Media Technologies Ltd.
FileDescription: AVS Video Burner Setup
FileVersion: 0.0.0.0
LegalCopyright:
OriginalFileName:
ProductName: AVS Video Burner
ProductVersion: 2.8.5.202
Translation: 0x0000 0x04b0

Bulz.200270 also known as:

LionicTrojan.Win32.Ekstak.4!c
MicroWorld-eScanGen:Variant.Bulz.200270
FireEyeGen:Variant.Bulz.200270
ALYacGen:Variant.Bulz.200270
CylanceUnsafe
SangforTrojan.Win32.Wacatac.C
K7AntiVirusTrojan ( 005722fe1 )
AlibabaTrojanDropper:Win32/Ekstak.cbafa4d7
K7GWTrojan ( 005722fe1 )
Cybereasonmalicious.bd0bbe
CyrenW32/Agent.CDU.gen!Eldorado
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
TrendMicro-HouseCallTROJ_GEN.R007C0WFR22
KasperskyTrojan.Win32.Ekstak.ahgek
BitDefenderGen:Variant.Bulz.200270
APEXMalicious
Ad-AwareGen:Variant.Bulz.200270
VIPREGen:Variant.Bulz.200270
TrendMicroTROJ_GEN.R007C0WFR22
McAfee-GW-EditionBehavesLike.Win32.Dropper.vc
EmsisoftGen:Variant.Bulz.200270 (B)
IkarusTrojan-Dropper.Win32.Agent
GDataGen:Variant.Bulz.200270
AviraHEUR/AGEN.1237233
ArcabitTrojan.Bulz.D30E4E
MicrosoftTrojan:Win32/Ymacco.AA2F
CynetMalicious (score: 99)
McAfeeArtemis!5B0A6A6BD0BB
MAXmalware (ai score=87)
VBA32Trojan.Ekstak
MalwarebytesAdware.DownloadAssistant
AvastWin32:Trojan-gen
YandexTrojan.Ekstak!rqC2HjQZIys
MaxSecureTrojan.Malware.184690692.susgen
FortinetW32/Agent.SLC!tr
AVGWin32:Trojan-gen
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Bulz.200270?

Bulz.200270 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment