Malware

What is “Flooder.Win32.CoreWarrior.a”?

Malware Removal

The Flooder.Win32.CoreWarrior.a is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Flooder.Win32.CoreWarrior.a virus can do?

  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Flooder.Win32.CoreWarrior.a?


File Info:

name: B723B61B134A89B2295D.mlw
path: /opt/CAPEv2/storage/binaries/04cc067901b00c67bc081ac9ad566037904d753b77b8114047dad6e5ab0d79bd
crc32: CBBAF472
md5: b723b61b134a89b2295d610cd392ea56
sha1: 178708a6eee3cf0b54e256c7743695268af29ecf
sha256: 04cc067901b00c67bc081ac9ad566037904d753b77b8114047dad6e5ab0d79bd
sha512: 6b3d8b3a10c819dd33afd7f071ee9f5ec07fc1e2a8f2010a6c6fa966ad47c5c9f6af78c150c53d016a89e0bdc1ae09eb9f1a829ee5ce9ef81e2aa801720eefa5
ssdeep: 1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+GK:LJ0TAz6Mte4A+aaZx8EnCGVuG
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T13083021646DB58F7E4AB027D469D9063B2FBA06F4BCE3EDBE1FC224DD6162B01580248
sha3_384: 4e4b98e50ffcc78e6d346a0da5dd5d5dcdb2583199f1fe25cd6c4dc9c050895680ff51e5abf67cb7a60834c0b3003549
ep_bytes: 60be154041008dbeebcffeff5783cdff
timestamp: 2014-07-01 18:02:13

Version Info:

0: [No Data]

Flooder.Win32.CoreWarrior.a also known as:

BkavW32.AIDetectMalware
LionicHacktool.Win32.Snojan.3!c
AVGWin32:Banker-LAA [Trj]
DrWebTool.Snojan.1
MicroWorld-eScanApplication.Agent.BPO
FireEyeApplication.Agent.BPO
SkyhighBehavesLike.Win32.BadFile.mc
McAfeeArtemis!B723B61B134A
MalwarebytesGeneric.Malware/Suspicious
VIPREApplication.Agent.BPO
SangforTrojan.Win32.Agent.Vmi5
K7AntiVirusTrojan ( 00575d031 )
AlibabaTrojanDownloader:Win32/CoreWarrior.49a4c46c
K7GWTrojan ( 00575d031 )
CrowdStrikewin/malicious_confidence_60% (D)
BitDefenderThetaGen:NN.ZexaF.36802.fmGfaC@Dadi
SymantecTrojan.Gen.MBT
Elasticmalicious (moderate confidence)
ESET-NOD32a variant of Win32/Agent.AAEF
CynetMalicious (score: 100)
ClamAVWin.Malware.Cymt-10023133-0
KasperskyHEUR:Flooder.Win32.CoreWarrior.a
BitDefenderApplication.Agent.BPO
NANO-AntivirusTrojan.Win32.Snojan.jqzopm
AvastWin32:Banker-LAA [Trj]
TencentMalware.Win32.Gencirc.10bfcc8f
EmsisoftApplication.Agent.BPO (B)
F-SecureTrojan.TR/Crypt.ULPM.Gen2
Trapminesuspicious.low.ml.score
SophosTroj/Bdoor-BHD
SentinelOneStatic AI – Suspicious PE
JiangminDownloader.Snojan.adp
GoogleDetected
AviraTR/Crypt.ULPM.Gen2
MAXmalware (ai score=71)
Antiy-AVLHackTool[Flooder]/Win32.CoreWarrior
MicrosoftTrojanDownloader:Win32/Nemucod
XcitiumTrojWare.Win32.Snojan.B@7h1cjp
ArcabitApplication.Agent.BPO
ZoneAlarmVHO:Flooder.Win32.CoreWarrior.gen
GDataWin32.Application.Snojan.A
Acronissuspicious
ALYacApplication.Agent.BPO
VBA32Flooder.CoreWarrior
Cylanceunsafe
PandaTrj/Genetic.gen
RisingDownloader.Snojan!8.ECDD (TFE:5:V47YrAkOYKG)
YandexTrojan.GenAsa!+IN19GpQULE
IkarusTrojan.SuspectCRC
MaxSecureTrojan.Malware.300983.susgen
FortinetRiskware/Snojan
Cybereasonmalicious.b134a8
DeepInstinctMALICIOUS
alibabacloudTrojan[downloader]:Win/Nemucod

How to remove Flooder.Win32.CoreWarrior.a?

Flooder.Win32.CoreWarrior.a removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment