Malware

Bulz.263720 (B) (file analysis)

Malware Removal

The Bulz.263720 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Bulz.263720 (B) virus can do?

  • Executable code extraction
  • Creates RWX memory
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Norwegian (Nynorsk)
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Steals private information from local Internet browsers
  • Attempts to modify proxy settings
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
realmengame.com
ip-api.com

How to determine Bulz.263720 (B)?


File Info:

crc32: 91FF3E5F
md5: 74053a9334151a9530acd1234e3ab86a
name: 74053A9334151A9530ACD1234E3AB86A.mlw
sha1: 83dd029cbd3e0dbbbfe325fb13d0348906bb2c02
sha256: a8058a034a341a74862ee03f21652d5aad1a03737cc5f9ea52d606bef971b386
sha512: 51a2c98c0c6ac225aba0e028bc17d6f3053efcf452d3102ddfab6cd6dbbd736215a0f9095315080b2c5d14c7db9c64b644fa277ae5fa74fd00a943bd6aaaa410
ssdeep: 12288:l9oLofB72/8rTsm9FLR6QzotyjbnGPfyXN/xW/qM+x:wLiBa0rTs+6Q8gq
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

InternalName: triwylbikes.acs
FileVers: 26.26.361
ProductionVersion: 1.0.22.25
Copyright: Copyrighz (C) 2020, padkafug
TranslationUsa: 0x0872 0x0081

Bulz.263720 (B) also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Bulz.263720
FireEyeGeneric.mg.74053a9334151a95
CAT-QuickHealTrojan.Chapak
ALYacGen:Variant.Bulz.263720
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.Chapak.4!c
SangforMalware
K7AntiVirusTrojan ( 005749401 )
BitDefenderGen:Variant.Bulz.263720
K7GWTrojan ( 005749401 )
CrowdStrikewin/malicious_confidence_80% (D)
CyrenW32/Kryptik.CRW.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:PWSX-gen [Trj]
ClamAVWin.Packed.Bulz-9808185-0
KasperskyTrojan.Win32.Chapak.ewut
ViRobotTrojan.Win32.Z.Bulz.606720.B
RisingTrojan.Kryptik!1.CFEE (CLASSIC)
Ad-AwareGen:Variant.Bulz.263720
EmsisoftGen:Variant.Bulz.263720 (B)
ComodoMalware@#3vpbew4c47tw
F-SecureTrojan.TR/AD.VidarStealer.fexrp
TrendMicroTROJ_GEN.R002C0WLD20
McAfee-GW-EditionBehavesLike.Win32.PWSSpyeye.hc
SophosMal/Generic-S
IkarusTrojan.Win32.Crypt
WebrootW32.Malware.Gen
AviraTR/AD.VidarStealer.fexrp
MAXmalware (ai score=86)
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Glupteba.NK!MTB
GridinsoftTrojan.Win32.Kryptik.oa
ArcabitTrojan.Bulz.D40628
ZoneAlarmTrojan.Win32.Chapak.ewut
GDataGen:Variant.Bulz.263720
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.GenKryptik.R357725
Acronissuspicious
McAfeeRDN/Generic.hbg
VBA32Trojan.Injuke
MalwarebytesTrojan.MalPack.GS
PandaTrj/GdSda.A
ESET-NOD32a variant of Win32/Kryptik.HIFB
TrendMicro-HouseCallTROJ_GEN.R002C0WLD20
SentinelOneStatic AI – Malicious PE
FortinetW32/Kryptik.HIFA!tr
BitDefenderThetaGen:NN.ZexaF.34700.LmKfa4TKd0cG
AVGFileRepMalware
Cybereasonmalicious.cbd3e0
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.790

How to remove Bulz.263720 (B)?

Bulz.263720 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment