Malware

Exploit.Win32.Shellcode.xfa (file analysis)

Malware Removal

The Exploit.Win32.Shellcode.xfa is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Exploit.Win32.Shellcode.xfa virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Attempts to connect to a dead IP:Port (5 unique times)
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Ukrainian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Steals private information from local Internet browsers
  • Attempts to access Bitcoin/ALTCoin wallets
  • Attempts to create or modify system certificates
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

telete.in
apps.identrust.com
trashbininspector.fun

How to determine Exploit.Win32.Shellcode.xfa?


File Info:

crc32: 83E05B44
md5: 0a6b81e7e6c925c47bb1fadfc2c4c752
name: 0A6B81E7E6C925C47BB1FADFC2C4C752.mlw
sha1: fdbb7e63007085b1bb5cce183a434f8e6725b56b
sha256: bd5f339b333a5a2b94681d0e054e7e607d96379e7e944ac9d356eab06ac5e60a
sha512: 3a25eb1f62c69d17895326b69f969472841d2ccc56b3a1e255e9c529a1c6b839e052ebb342eb82bb03f51fec25cb79ceecd5f091d63deb4f624bee51388be394
ssdeep: 12288:DRKq7TDqUrV/rXtYwSy8Wk5slLwCwrMuj0oIXrRXcsnCwD:1h7TDqUrZXtnSy8WZlLwC4MlYsnr
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

InternalSurname: debaukd.ekze
Prod: 1.2.7
FileVersions: 1.0.5.6
LegalCo: Copyri (C) 2019, permudationzi

Exploit.Win32.Shellcode.xfa also known as:

Elasticmalicious (high confidence)
DrWebTrojan.Siggen11.56849
MicroWorld-eScanTrojan.GenericKD.45230609
FireEyeGeneric.mg.0a6b81e7e6c925c4
CAT-QuickHealTrojan.Glupteba
Qihoo-360Win32/Trojan.Exploit.b50
ALYacTrojan.GenericKD.45230609
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 005756381 )
BitDefenderTrojan.GenericKD.45230609
K7GWTrojan ( 005756381 )
Cybereasonmalicious.300708
BitDefenderThetaGen:NN.ZexaF.34700.CmGfaueVRRic
CyrenW32/Trojan.JUSJ-2639
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HILR
TrendMicro-HouseCallTROJ_GEN.R002C0WLT20
AvastWin32:DropperX-gen [Drp]
KasperskyExploit.Win32.Shellcode.xfa
AlibabaTrojan:Win32/Shellcode.2f36e886
ViRobotTrojan.Win32.Z.Agent.463360.AGH
AegisLabRiskware.Win32.Generic.1!c
TencentWin32.Exploit.Shellcode.Gbz
Ad-AwareTrojan.GenericKD.45230609
SophosMal/Generic-S (PUA)
ComodoMalware@#3l5yuz6gw3uyk
F-SecureTrojan.TR/Crypt.Agent.sfcmo
TrendMicroTROJ_GEN.R002C0WLT20
McAfee-GW-EditionBehavesLike.Win32.Trojan.gc
EmsisoftTrojan.Crypt (A)
IkarusTrojan.Win32.Krypt
JiangminExploit.ShellCode.beq
AviraTR/Crypt.Agent.sfcmo
MAXmalware (ai score=80)
KingsoftWin32.Troj.Generic_a.a.(kcloud)
MicrosoftTrojan:Win32/Zenpack.MU!MTB
GridinsoftTrojan.Win32.Downloader.oa
ArcabitTrojan.Generic.D2B22A11
ZoneAlarmExploit.Win32.Shellcode.xfa
GDataTrojan.GenericKD.45230609
CynetMalicious (score: 100)
Acronissuspicious
McAfeeRDN/Generic PUP.x
VBA32Trojan.Azorult
MalwarebytesTrojan.MalPack.GS
PandaTrj/GdSda.A
APEXMalicious
RisingBackdoor.Agent!8.C5D (TFE:5:IhzqwXEXQUL)
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_62%
FortinetW32/Kryptik.HGHW!tr
AVGWin32:DropperX-gen [Drp]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Exploit.Win32.Shellcode.xfa?

Exploit.Win32.Shellcode.xfa removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment