Malware

Bulz.289162 malicious file

Malware Removal

The Bulz.289162 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Bulz.289162 virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Expresses interest in specific running processes
  • A process created a hidden window
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Norwegian (Nynorsk)
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Installs itself for autorun at Windows startup
  • Contacts C&C server HTTP check-in (Banking Trojan)
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
gxd3fp7fe7cac6jzn2sac.online

How to determine Bulz.289162?


File Info:

crc32: 106BA53A
md5: fae1614105abb7aacf2da03b5402a5e1
name: FAE1614105ABB7AACF2DA03B5402A5E1.mlw
sha1: f7914176468da3346da61b8c3ebe530cb4bf62b6
sha256: 5df066693269e6e5cbe30e08a066e4934a4e1d3fd8cc900587326f248aa52a1d
sha512: b992bbb1b805d61af4db3abb635b85ea5a41858dbeb4ddc5e027130873ddfd46d0ec3ab216c356323efad66fc27c277ad8a07f107a5dc328446ccb660955b78b
ssdeep: 6144:zBpsV89zFh9okb20/2WlRAuhyddFqaGv3aAG/TqQnzzsmZ9KZWoV:46zFIkb22lRlhy7Ftg3aACWjmZ9KZW
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

InternalName: triwilbifog.acs
FileVersion: 6.26.361
Copyright: Copyrighz (C) 2020, vodkafug
ProductVersion: 1.0.2
TranslationUsa: 0x0273 0x04d3

Bulz.289162 also known as:

Elasticmalicious (high confidence)
FireEyeGeneric.mg.fae1614105abb7aa
McAfeeArtemis!FAE1614105AB
CylanceUnsafe
SangforMalware
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderGen:Variant.Bulz.289162
K7GWRiskware ( 0040eff71 )
Cybereasonmalicious.6468da
CyrenW32/Kryptik.CUR.gen!Eldorado
SymantecML.Attribute.HighConfidence
TrendMicro-HouseCallTROJ_GEN.R002H0CLV20
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyTrojan-Spy.Win32.SpyEyes.blcw
AlibabaTrojanSpy:Win32/SpyEyes.b44ba1cc
AegisLabTrojan.Multi.Generic.4!c
MicroWorld-eScanGen:Variant.Bulz.289162
AvastWin32:DropperX-gen [Drp]
Ad-AwareGen:Variant.Bulz.289162
SophosMal/Generic-S
F-SecureTrojan.TR/AD.TriumphLoader.xdwey
McAfee-GW-EditionBehavesLike.Win32.Trojan.gc
EmsisoftGen:Variant.Bulz.289162 (B)
SentinelOneStatic AI – Malicious PE
AviraTR/AD.TriumphLoader.xdwey
MAXmalware (ai score=86)
MicrosoftTrojan:Win32/Glupteba.NV!MTB
GridinsoftTrojan.Win32.Packed.oa
ArcabitTrojan.Bulz.D4698A
ZoneAlarmTrojan-Spy.Win32.SpyEyes.blcw
GDataGen:Variant.Bulz.289162
BitDefenderThetaGen:NN.ZexaF.34700.zmKfaCApaHlG
ALYacGen:Variant.Bulz.289162
MalwarebytesTrojan.MalPack.GS
APEXMalicious
ESET-NOD32a variant of Win32/Kryptik.HIMI
RisingTrojan.Kryptik!1.CFEE (CLASSIC)
IkarusTrojan.Win32.Crypt
eGambitUnsafe.AI_Score_94%
FortinetW32/Kryptik.HIFA!tr
AVGWin32:DropperX-gen [Drp]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360Generic/HEUR/QVM11.1.4A68.Malware.Gen

How to remove Bulz.289162?

Bulz.289162 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment