Malware

Dropper.38 (file analysis)

Malware Removal

The Dropper.38 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Dropper.38 virus can do?

  • Sample contains Overlay data
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Behavioural detection: Injection (inter-process)

How to determine Dropper.38?


File Info:

name: 952183E638885CFB1AFD.mlw
path: /opt/CAPEv2/storage/binaries/9eb90132c2107d8ffafc8d4ffd27a90b54f33e76ba0b722cc56303c850eb1831
crc32: 0E061C05
md5: 952183e638885cfb1afd0ab84800191e
sha1: f1eedec4aa587e3add2eb5d6eece3309c2961442
sha256: 9eb90132c2107d8ffafc8d4ffd27a90b54f33e76ba0b722cc56303c850eb1831
sha512: 41831862b0131ae2b1ccbf97136c941f0cc4cc2aee04770beb9ec4578c626e782dc1dafa11a1576f9bcaab36c414bd5e12757e574a956b21244d23fc05c9fc33
ssdeep: 3072:lOxXwSmJQMva8zFki2kXbcvpoAD4q56YfZZBpU2mWMEBKCDo2uM+yQTfcyOUXQr4:XJZv5zFiIODmfWlzyOGt
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T18FA4C5E8729593F1EA4C7AF1AB305C9607355B337539603B392B7B440FE6A0188E99F1
sha3_384: 956b8103aeb9dee67d7b1a909eaab5834aff4eff2ab015aa7d7b2d3893ed84b8e5e6223c0aa0d8bf4816372a7cc62e81
ep_bytes: 558bec6aff68d04d410068c84d400064
timestamp: 2009-12-22 05:36:37

Version Info:

0: [No Data]

Dropper.38 also known as:

BkavW32.AIDetectMalware
AVGWin32:Agent-AMKL [Drp]
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Dropper.38
FireEyeGeneric.mg.952183e638885cfb
CAT-QuickHealVirTool.CeeInject.CR3
SkyhighGeneric Dropper.sq
McAfeeGeneric Dropper.sq
Cylanceunsafe
ZillyaTrojan.Injector.Win32.27940
SangforSuspicious.Win32.Save.ins
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaVirTool:Win32/CeeInject.3c3aea2a
K7GWTrojan ( 004be7711 )
K7AntiVirusTrojan ( 004be7711 )
BitDefenderThetaGen:NN.ZexaF.36802.DmX@a8yQ7Kp
VirITTrojan.Win32.Generic.BUSJ
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.BPJ
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Dropper.Agent-335888
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Dropper.38
NANO-AntivirusTrojan.Win32.Inegery.cvbhew
AvastWin32:Agent-AMKL [Drp]
TencentTrojan.Win32.Inject.e
EmsisoftGen:Variant.Dropper.38 (B)
F-SecureTrojan.TR/Dropper.Gen2
DrWebTrojan.StartPage.31364
VIPREGen:Variant.Dropper.38
TrendMicroTROJ_ADCLCKR.SMB
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
JiangminTrojan/Generic.be
VaristW32/Injector.N.gen!Eldorado
AviraTR/Dropper.Gen2
Antiy-AVLTrojan[Dropper]/Win32.Inegery
KingsoftWin32.HeurC.KVMH017.a
MicrosoftTrojan:Win32/Startpage.HK
XcitiumTrojWare.Win32.TrojanDropper.Inegery.A@23kosv
ArcabitTrojan.Dropper.38
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Dropper.38
GoogleDetected
AhnLab-V3Trojan/Win32.Inegery.R6038
VBA32BScope.Trojan.StartPage
ALYacGen:Variant.Dropper.38
MAXmalware (ai score=100)
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_ADCLCKR.SMB
RisingTrojan.Win32.Inject.fpp (CLASSIC)
YandexTrojan.GenAsa!xsQc3Ne8Ymo
IkarusTrojan-Dropper.SuspectCRC
MaxSecureTrojan.Malware.1728868.susgen
FortinetW32/Generic.AC.1200989
DeepInstinctMALICIOUS
alibabacloudTrojan[dropper]:Win/Generic

How to remove Dropper.38?

Dropper.38 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment