Malware

What is “Doris.5250”?

Malware Removal

The Doris.5250 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Doris.5250 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Doris.5250?


File Info:

name: 982D4FD2BCB6CCE6E2AB.mlw
path: /opt/CAPEv2/storage/binaries/515bc79505620ea1c3cc5c0c2d22ac89b166a6c90c77310d7f7030734482064e
crc32: CEFC747D
md5: 982d4fd2bcb6cce6e2abe5cb767b5bf3
sha1: e794693dab0d1480b9ff352b2972d7748db9442e
sha256: 515bc79505620ea1c3cc5c0c2d22ac89b166a6c90c77310d7f7030734482064e
sha512: f051cb834bd0eee04e92d34a09559dccfe9be9b27f2e5ff34b7cee3314fd67d1c486609bf98d28368a01fcc74edc3b1c06f2189713de9b6a83d9adf1521d1bf1
ssdeep: 768:F2fbbIQAHWaqbw33N56GLaO7zG9tvV/Uba/6WPnZs+zDzvcvaJZydyfLWVnM73RU:QgV+/6WPDzUvgQKLW4WPN
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14A53083B6ADCF032C539C6B38867D6A4C1237D7A29019947209BA6595E339533FD232F
sha3_384: 067693799f028dc516374896881790dd2bfb56e6d47382b7b493eb8b189ec570e581c08969484d636476b79a105b76e8
ep_bytes: 68ac1c4000e85ca6ffff000000000000
timestamp: 2012-06-29 03:05:25

Version Info:

CompanyName: Camshare Inc.
FileDescription: Camfrog Video Chat
FileVersion: 6, 2, 192, 3417
InternalName: Camfrog
LegalCopyright: (C) 2003-2012 Camshare Inc.
OriginalFilename: Camfrog Video Chat.exe
ProductName: Camfrog Video Chat
ProductVersion: 6, 2, 192, 3417
Translation: 0x0409 0x04b0

Doris.5250 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.VBKrypt.1d!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Doris.5250
FireEyeGeneric.mg.982d4fd2bcb6cce6
SkyhighGenericRXAH-ZP!982D4FD2BCB6
ALYacGen:Variant.Doris.5250
Cylanceunsafe
ZillyaTrojan.Llac.Win32.43406
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojan:Win32/VBKrypt.6c0a629d
K7GWTrojan ( 0055e3991 )
K7AntiVirusTrojan ( 0055e3991 )
VirITTrojan.Win32.Generic.BWRQ
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Injector.VYH
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.VBKrypt.ppzu
BitDefenderGen:Variant.Doris.5250
NANO-AntivirusTrojan.Win32.Llac.bbskzq
AvastWin32:GenMalicious-YS [Trj]
TencentMalware.Win32.Gencirc.1155b0d3
EmsisoftGen:Variant.Doris.5250 (B)
F-SecureTrojan.TR/Patched.Ren.Gen
DrWebTrojan.PWS.UFR.3470
VIPREGen:Variant.Doris.5250
Trapminemalicious.moderate.ml.score
SophosML/PE-A
IkarusBackdoor.Win32.Ruskill
GDataGen:Variant.Doris.5250
JiangminTrojan/Generic.akzrg
WebrootW32.Malware.Gen
GoogleDetected
AviraTR/Patched.Ren.Gen
Antiy-AVLTrojan/Win32.VBKrypt
KingsoftWin32.Trojan.VBKrypt.ppzu
XcitiumMalware@#21dwd5yhthx1u
ArcabitTrojan.Doris.D1482
ZoneAlarmTrojan.Win32.VBKrypt.ppzu
MicrosoftTrojanSpy:Win32/Usteal.D
AhnLab-V3Trojan/Win32.Llac.R37634
Acronissuspicious
McAfeeGenericRXAH-ZP!982D4FD2BCB6
VBA32TScope.Trojan.VB
MalwarebytesGeneric.Malware/Suspicious
PandaTrj/OCJ.A
RisingTrojan.Generic@AI.100 (RDML:rU6CJvwQIw3ysctnLCsRBA)
YandexTrojan.Injector!qbgTdDHEu00
SentinelOneStatic AI – Malicious PE
FortinetW32/Filecoder_CTBLocker.A!tr
AVGWin32:GenMalicious-YS [Trj]
DeepInstinctMALICIOUS

How to remove Doris.5250?

Doris.5250 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment