Malware

About “Exploit.Win32.Shellcode.xfm” infection

Malware Removal

The Exploit.Win32.Shellcode.xfm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Exploit.Win32.Shellcode.xfm virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Attempts to connect to a dead IP:Port (5 unique times)
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Ukrainian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Steals private information from local Internet browsers
  • Attempts to access Bitcoin/ALTCoin wallets
  • Attempts to create or modify system certificates
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
telete.in
apps.identrust.com
trashbininspector.fun

How to determine Exploit.Win32.Shellcode.xfm?


File Info:

crc32: F69FBCA5
md5: fec762c5a2da6db72544371c633b1dac
name: FEC762C5A2DA6DB72544371C633B1DAC.mlw
sha1: 618d06b9c84609b519cb88a6047a26c6cda92955
sha256: 96e8a552286bdc774b6aa631a854546e8124aada68ab2b9ee0effbacbea9face
sha512: e4c4c4ca63033812c14b9a746dd175fdbda41ca5c01868f5b43538cb27e7629aa459216d58bff4a0e2898d7b14b899b4f810fe8c3b12a60a08cdbcfc8245aedf
ssdeep: 6144:+uYM8a8/5mTsCSM7j1hiLycyPp1vCicM9ascf+apulzd3naTXjm6EsAd:+NM8JxmTsXM7pZcmq9sa9fWlz4tEsAd
type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed

Version Info:

InternalSurname: debaukd.ekze
Prod: 1.2.7
FileVersions: 1.0.5.6
LegalCo: Copyri (C) 2019, permudationzi

Exploit.Win32.Shellcode.xfm also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.35918138
FireEyeGeneric.mg.fec762c5a2da6db7
ALYacTrojan.Agent.Raccoon
CylanceUnsafe
AegisLabTrojan.Multi.Generic.4!c
SangforMalware
K7AntiVirusTrojan ( 005756611 )
BitDefenderTrojan.GenericKD.35918138
K7GWTrojan ( 005756611 )
CyrenW32/Trojan.MBCI-2789
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:DropperX-gen [Drp]
KasperskyExploit.Win32.Shellcode.xfm
AlibabaTrojan:Win32/Shellcode.e98b6337
ViRobotTrojan.Win32.Z.Malpack.463872.B
TencentWin32.Exploit.Shellcode.Eibn
Ad-AwareTrojan.GenericKD.35918138
SophosMal/Generic-S
ComodoMalware@#3307k9i53y4ej
F-SecureTrojan.TR/AD.StellarStealer.dkabc
DrWebTrojan.Siggen11.56849
McAfee-GW-EditionBehavesLike.Win32.Trojan.gc
EmsisoftTrojan.Crypt (A)
IkarusTrojan.Win32.Crypt
AviraTR/AD.StellarStealer.dkabc
MAXmalware (ai score=88)
KingsoftWin32.Exploit.ShellCode.x.(kcloud)
MicrosoftTrojan:Win32/Zenpack.MU!MTB
GridinsoftTrojan.Win32.Packed.oa
ArcabitTrojan.Generic.D224113A
ZoneAlarmExploit.Win32.Shellcode.xfm
GDataTrojan.GenericKD.35918138
CynetMalicious (score: 100)
Acronissuspicious
McAfeeGenericRXNE-RE!FEC762C5A2DA
VBA32Trojan.Glupteba
MalwarebytesTrojan.MalPack.GS
PandaTrj/GdSda.A
ESET-NOD32a variant of Win32/Kryptik.HILR
TrendMicro-HouseCallTROJ_GEN.R002H09LT20
RisingBackdoor.Agent!8.C5D (TFE:5:IhzqwXEXQUL)
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_56%
FortinetW32/Kryptik.HGHW!tr
BitDefenderThetaGen:NN.ZexaF.34700.CmGfaKgJH4ic
AVGWin32:DropperX-gen [Drp]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360Generic/HEUR/QVM11.1.413F.Malware.Gen

How to remove Exploit.Win32.Shellcode.xfm?

Exploit.Win32.Shellcode.xfm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment