Malware

Bulz.925285 (B) removal tips

Malware Removal

The Bulz.925285 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Bulz.925285 (B) virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Dynamic (imported) function loading detected
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is likely packed with VMProtect
  • Authenticode signature is invalid
  • Tries to suspend Cuckoo threads to prevent logging of malicious activity
  • Anomalous binary characteristics

How to determine Bulz.925285 (B)?


File Info:

name: 2F28F9312C36EC5AB889.mlw
path: /opt/CAPEv2/storage/binaries/aa9a79648944c9cc9e5ce9a49014635ae10827a85a5d15be0b35f94c3d57c744
crc32: 0F2CDE60
md5: 2f28f9312c36ec5ab8890049656c6f58
sha1: 15b05746beb88781862f43afafaea6e9a147f8c8
sha256: aa9a79648944c9cc9e5ce9a49014635ae10827a85a5d15be0b35f94c3d57c744
sha512: af46307f00fed2be9ea411e16159ed3b4fa83b6f2c9013d067e9613c9da530a2dcd52a91f517295de539f005575e32ba4f7ca9a656259d6c0cda0fa122cd410a
ssdeep: 98304:Cjh7g+MoYoBwUTwaHcxT7BHeRKO5wS2FVUjnpZEn4e+n6gTQfjg:C7g+MdIT8F7tW5wSjrbELdgTQfjg
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T18846233327250049C0D6CC3A84377EE576F60FB69B41E4796DEBB9C22A725E0F606897
sha3_384: 7d0d79196146e7b99419d15968e1ad3bcd23b9998b4992a3a429258152994ae0d711632367c1fe7d1cb5292cabbe4845
ep_bytes: 685a758487e890c0bfff8b0f36660fb6
timestamp: 2012-07-13 22:47:16

Version Info:

CompanyName: The Qt Company Ltd.
FileDescription: C++ Application Development Framework
FileVersion: 5.15.2.0
LegalCopyright: Copyright (C) 2020 The Qt Company Ltd.
OriginalFilename: QtWebEngineProcess.exe
ProductName: Qt5
ProductVersion: 5.15.2.0
Translation: 0x0409 0x04b0

Bulz.925285 (B) also known as:

LionicTrojan.Win32.Bulz.4!c
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Steam.23235
MicroWorld-eScanGen:Variant.Bulz.925285
FireEyeGeneric.mg.2f28f9312c36ec5a
ALYacGen:Variant.Bulz.925285
K7AntiVirusTrojan ( 00588eeb1 )
AlibabaTrojanSpy:Win32/Stealer.76becb7c
BitDefenderThetaGen:NN.ZexaF.34062.@B2@aaXSmRai
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Packed.VMProtect.YU
TrendMicro-HouseCallTROJ_GEN.R002H09L521
Paloaltogeneric.ml
KasperskyTrojan-Spy.Win32.Stealer.aodg
BitDefenderGen:Variant.Bulz.925285
AvastWin32:Trojan-gen
Ad-AwareGen:Variant.Bulz.925285
EmsisoftGen:Variant.Bulz.925285 (B)
McAfee-GW-EditionArtemis!Trojan
SophosMal/Generic-R
IkarusTrojan.Win32.VMProtect
GDataGen:Variant.Bulz.925285
AviraHEUR/AGEN.1145256
GridinsoftRansom.Win32.Sabsik.sa
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
AhnLab-V3HackTool/Win32.Agent.R342140
McAfeeArtemis!2F28F9312C36
MAXmalware (ai score=84)
MalwarebytesTrojan.Crypt
YandexTrojan.GenAsa!u0gH+a0TujA
eGambitPE.Heur.InvalidSig
FortinetW32/VMProtect.JG!tr
AVGWin32:Trojan-gen
PandaTrj/CI.A

How to remove Bulz.925285 (B)?

Bulz.925285 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment