Malware

How to remove “Doina.19138 (B)”?

Malware Removal

The Doina.19138 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Doina.19138 (B) virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Attempts to connect to a dead IP:Port (5 unique times)
  • Dynamic (imported) function loading detected
  • Network anomalies occured during the analysis.
  • Starts servers listening on 127.0.28.27:1001, 127.0.28.27:1002, 127.0.28.27:1003, 127.0.28.27:1004, 127.0.28.27:1005, 127.0.28.27:1006, 127.0.28.27:1007, 127.0.28.27:1008, 127.0.28.27:1009, 127.0.28.27:1010, 127.0.28.27:1011, 127.0.28.27:1012, 127.0.28.27:1013, 127.0.28.27:1014, 127.0.28.27:1015, 127.0.28.27:1016, 127.0.28.27:1017, 127.0.28.27:1018, 127.0.28.27:1019, 127.0.28.27:1020, 127.0.28.27:1021, 127.0.28.27:1022, 127.0.28.27:1023, 127.0.28.27:1024, 127.0.28.27:1025, 127.0.28.27:1026, 127.0.28.27:1027, 127.0.28.27:1028, 127.0.28.27:1029, 127.0.28.27:1030, 127.0.28.27:1031, 127.0.28.27:1032, 127.0.28.27:1033, 127.0.28.27:1034, 127.0.28.27:1035, 127.0.28.27:1036, 127.0.28.27:1037, 127.0.28.27:1038, 127.0.28.27:1039, 127.0.28.27:1040, 127.0.28.27:1041, 127.0.28.27:1042, 127.0.28.27:1043, 127.0.28.27:1044, 127.0.28.27:1045, 127.0.28.27:1046, 127.0.28.27:1047, 127.0.28.27:1048, 127.0.28.27:1049, 127.0.28.27:1050, 127.0.28.27:1051, 127.0.28.27:1052, 127.0.28.27:1053, 127.0.28.27:1054, 127.0.28.27:1055, 127.0.28.27:1056, 127.0.28.27:1057, 127.0.28.27:1058, 127.0.28.27:1059, 127.0.28.27:1060, 127.0.28.27:1061, 127.0.28.27:1062, 127.0.28.27:1063, 127.0.28.27:1064, 127.0.28.27:1065, 127.0.28.27:1066, 127.0.28.27:1067, 127.0.28.27:1068, 127.0.28.27:1069, 127.0.28.27:1070, 127.0.28.27:1071, 127.0.28.27:1072, 127.0.28.27:1073, 127.0.28.27:1074, 127.0.28.27:1075, 127.0.28.27:1076, 127.0.28.27:1077, 127.0.28.27:1078, 127.0.28.27:1079, 127.0.28.27:1080, 127.0.28.27:1081, 127.0.28.27:1082, 127.0.28.27:1083, 127.0.28.27:1084, 127.0.28.27:1085, 127.0.28.27:1086, 127.0.28.27:1087, 127.0.28.27:1088, 127.0.28.27:1089, 127.0.28.27:1090, 127.0.28.27:1091, 127.0.28.27:1092, 127.0.28.27:1093, 127.0.28.27:1094, 127.0.28.27:1095, 127.0.28.27:1096, 127.0.28.27:1097, 127.0.28.27:1098, 127.0.28.27:1099, 127.0.28.27:1100
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • Reads data out of its own binary image
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Authenticode signature is invalid
  • Tries to suspend Cuckoo threads to prevent logging of malicious activity
  • Anomalous binary characteristics

Related domains:

config.yunjiasu.kkidc.com
httpbin.org
wpad.local-net

How to determine Doina.19138 (B)?


File Info:

name: 179E77F837EBE0DB0DAB.mlw
path: /opt/CAPEv2/storage/binaries/687671b88fc4994f286935e53d71e8f7a6d0207c096cf5641fe5b88ee639f3c4
crc32: 5F9D438E
md5: 179e77f837ebe0db0dab2c179ff1b1bc
sha1: cef299746a51e9fd432fe736ca5543e7bb98dd12
sha256: 687671b88fc4994f286935e53d71e8f7a6d0207c096cf5641fe5b88ee639f3c4
sha512: 0aa6bc67a2d9dccaebe381490c829970b3b05a4f511aca589b09d4495ba68e0deaf5f0c718a2d2434ab3d4fe4d59b266df1370733181f7ff841bade286d8a3cf
ssdeep: 98304:DixHdV9K7wBtMKl9XdTmgc9UyplH53Tv46e8iwEz6I7Re2uIcGjY9zZ:D6dgONTmgcGylv46ehdldY9zZ
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T142469E01E752C176F99314B65ABE976E287CAF311704A4C7E3C82E6D0A716E23A37353
sha3_384: ef99703265e0ad41921eecabc79754057ec44174e176ecafcfea66045e253d695b6fccecdad525476d23364a3ef5daa0
ep_bytes: e8e3ef0000e979feffff8bff558bec53
timestamp: 2021-07-13 08:30:03

Version Info:

0: [No Data]

Doina.19138 (B) also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Doina.19138
FireEyeGeneric.mg.179e77f837ebe0db
ALYacGen:Variant.Doina.19138
CylanceUnsafe
ZillyaTrojan.Bingoml.Win32.5453
AlibabaTrojan:Win32/Bingoml.c278c800
SymantecML.Attribute.HighConfidence
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Win32.Bingoml.gen
BitDefenderGen:Variant.Doina.19138
AvastWin32:TrojanX-gen [Trj]
TencentMalware.Win32.Gencirc.10cecaba
Ad-AwareGen:Variant.Doina.19138
EmsisoftGen:Variant.Doina.19138 (B)
TrendMicroTROJ_GEN.R002C0PKM21
McAfee-GW-EditionBehavesLike.Win32.Dropper.th
GDataGen:Variant.Doina.19138
JiangminTrojanDropper.Dapato.acwb
AviraTR/Redcap.jllcl
ArcabitTrojan.Doina.D4AC2
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.C4564223
McAfeeGenericRXPS-JL!179E77F837EB
VBA32BScope.TrojanDropper.Dapato
TrendMicro-HouseCallTROJ_GEN.R002C0PKM21
YandexTrojan.Bingoml!aORAKsskp78
FortinetW32/PossibleThreat
BitDefenderThetaGen:NN.ZexaF.34294.@BX@ayqSo0kj
AVGWin32:TrojanX-gen [Trj]

How to remove Doina.19138 (B)?

Doina.19138 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment