Malware

Delf.14 malicious file

Malware Removal

The Delf.14 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Delf.14 virus can do?

  • Sample contains Overlay data
  • The binary contains an unknown PE section name indicative of packing
  • Executable file is packed/obfuscated with ASPack
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Binary file triggered YARA rule
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Delf.14?


File Info:

name: 99669CC5CF4582F077F6.mlw
path: /opt/CAPEv2/storage/binaries/ee46578c119cdcb2e29674cd8cac482d7d4a1519b1736333bee028a925548325
crc32: AF037768
md5: 99669cc5cf4582f077f634ba437a0073
sha1: 8f4ca018c3fceebfc0f19151b9c4e400b7c4c704
sha256: ee46578c119cdcb2e29674cd8cac482d7d4a1519b1736333bee028a925548325
sha512: c77e15d7ab5aa26dd1a475550ac094a344e28ffd5df9e11919f70c646cd6da7eb1003883491aa1040641a35fe726c049fcd7646e46ad017f79a4a7406c3eab47
ssdeep: 12288:MD48aMMsKS9BAXjhkTMyWt4w/ui5WCLjNBNV:MUSMsL72qMS1EWajf
type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
tlsh: T110D4231ABB49B1E0DEB926F55BE9E938E648D39D4C0B3F3B8121858F8F46D701C9D124
sha3_384: 539f39c93140ac948d191d06d1c6fd454b017d69fb4799af74a4b52f0786ab3f7754ab109aef73a757a2a9a7f274b681
ep_bytes: 60e803000000e9eb045d4555c3e80100
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Delf.14 also known as:

LionicTrojan.Win32.Agent2.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Delf.14
FireEyeGeneric.mg.99669cc5cf4582f0
CAT-QuickHealTrojan.IgenericIH.S27538228
SkyhighBehavesLike.Win32.Dropper.jc
ALYacGen:Variant.Delf.14
Cylanceunsafe
SangforSuspicious.Win32.Save.ins
CrowdStrikewin/malicious_confidence_100% (D)
AlibabaBackdoor:Win32/Banker.4bd98a9c
K7GWTrojan ( 001421811 )
K7AntiVirusTrojan ( 001421811 )
BaiduWin32.Trojan.BHO.i
VirITTrojan.Win32.Agent3.CAL
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/BHO.OAV
APEXMalicious
TrendMicro-HouseCallTROJ_AGENT_024238.TOMB
McAfeeGenericRXAA-AA!99669CC5CF45
AvastWin32:Trojan-gen
ClamAVWin.Trojan.Agent-374736
KasperskyUDS:DangerousObject.Multi.Generic
BitDefenderGen:Variant.Delf.14
NANO-AntivirusTrojan.Win32.MlwGen.crcja
TencentMalware.Win32.Gencirc.10b31e46
SophosMal/Banker-DQ
F-SecureTrojan.TR/ATRAPS.Gen
DrWebTrojan.Siggen4.43340
VIPREGen:Variant.Delf.14
TrendMicroTROJ_AGENT_024238.TOMB
EmsisoftGen:Variant.Delf.14 (B)
IkarusTrojan.BHO
JiangminTrojan/Agent.eoxh
VaristW32/Agent.JD.gen!Eldorado
AviraTR/ATRAPS.Gen
MAXmalware (ai score=100)
Antiy-AVLTrojan/Win32.Agent2
KingsoftWin32.Hack.Generic.a
MicrosoftProgram:Win32/Wacapew.C!ml
XcitiumTrojWare.Win32.BHO.VAE@2ndgle
ArcabitTrojan.Delf.14
ViRobotTrojan.Win32.A.Agent.645248.A[ASPack]
ZoneAlarmUDS:DangerousObject.Multi.Generic
GDataGen:Variant.Delf.14
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.BHO.R5891
VBA32Trojan.Agent2
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Genetic.gen
RisingTrojan.Win32.Generic.124AAA2A (C64:YzY0OkBwRxXnJPTB)
YandexTrojan.GenAsa!nOyftPY6xjM
SentinelOneStatic AI – Suspicious PE
FortinetW32/Dx.WKC!tr
AVGWin32:Trojan-gen
DeepInstinctMALICIOUS
alibabacloudTrojan[spy]:Win/BHO.OAV

How to remove Delf.14?

Delf.14 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment