Malware

Bulz.274126 (B) removal

Malware Removal

The Bulz.274126 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Bulz.274126 (B) virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (3 unique times)
  • Creates RWX memory
  • A process created a hidden window
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Norwegian (Nynorsk)
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Uses Windows utilities for basic functionality
  • Steals private information from local Internet browsers
  • Exhibits possible ransomware file modification behavior
  • Writes a potential ransom message to disk
  • Attempts to modify proxy settings
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

z.whorecord.xyz
a.tomx.xyz
www.cncode.pw
iplogger.org
ocsp.comodoca.com
ocsp.usertrust.com
ocsp.sectigo.com

How to determine Bulz.274126 (B)?


File Info:

crc32: 3CC0CED6
md5: dee19dc1523b455fe966856b1e40c318
name: DEE19DC1523B455FE966856B1E40C318.mlw
sha1: 19acd9c45ef53554c50d8b0e3325f39f167f8324
sha256: a5632f56cdc26f840cda9dab027856c8100f37a44446de8f25778b092640b3ed
sha512: f9f9af9a7aa6f1c6fcf92a04e3481fddaa684ee967949c4c8b6350e173b766440f52f258fbd09d6eb22ee82b99b68310ed8f234831a6d7da60c5636e7dd741d6
ssdeep: 12288:PSIEKSVBxZVx9ZzIQR8OAhXje03tC+VUdlqWn:aI3UBNv1IQR8OAhXjeAtYdlqW
type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed

Version Info:

InternalName: triwilbifes.acs
FileVers: 26.26.361
ProductVersion: 1.0.22
Copyright: Copyrighz (C) 2020, fadkafug
TranslationUsa: 0x0272 0x04d4

Bulz.274126 (B) also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Bulz.274126
McAfeeRDN/Generic.dx
CylanceUnsafe
SangforMalware
AlibabaTrojanPSW:Win32/Glupteba.27010186
K7GWTrojan ( 00574dcf1 )
Cybereasonmalicious.1523b4
BitDefenderThetaGen:NN.ZexaF.34700.HmKfaimz0MaG
SymantecML.Attribute.HighConfidence
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Dropper.Tofsee-9812536-0
KasperskyHEUR:Trojan-PSW.Win32.Tepfer.vho
BitDefenderGen:Variant.Bulz.274126
AegisLabTrojan.Win32.Tepfer.i!c
AvastWin32:MalwareX-gen [Trj]
RisingTrojan.Kryptik!8.8 (TFE:5:4GYgIj05huN)
Ad-AwareGen:Variant.Bulz.274126
EmsisoftGen:Variant.Bulz.274126 (B)
F-SecureTrojan.TR/AD.Socelars.BX
DrWebTrojan.PWS.Stealer.29729
TrendMicroTROJ_GEN.R002C0DLS20
McAfee-GW-EditionBehavesLike.Win32.Trojan.hc
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Bulz.274126
eGambitUnsafe.AI_Score_94%
AviraTR/AD.Socelars.BX
MAXmalware (ai score=100)
GridinsoftTrojan.Win32.Kryptik.oa
ArcabitTrojan.Bulz.D42ECE
ZoneAlarmHEUR:Trojan-PSW.Win32.Tepfer.vho
MicrosoftTrojan:Win32/Glupteba.NR!MTB
CynetMalicious (score: 100)
Acronissuspicious
VBA32BScope.Trojan.Glupteba
ALYacGen:Variant.Bulz.274126
MalwarebytesTrojan.MalPack.GS
ESET-NOD32a variant of Win32/Kryptik.HIIF
TrendMicro-HouseCallTROJ_GEN.R002C0DLS20
TencentWin32.Trojan-qqpass.Qqrob.Wwxt
IkarusWin32.Outbreak
FortinetW32/Kryptik.HIFA!tr
AVGFileRepMalware
CrowdStrikewin/malicious_confidence_80% (D)
Qihoo-360Win32/Trojan.PSW.a4a

How to remove Bulz.274126 (B)?

Bulz.274126 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment