Malware

Generic.Dacic.2C5202F5.A.FF282F44 (file analysis)

Malware Removal

The Generic.Dacic.2C5202F5.A.FF282F44 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Generic.Dacic.2C5202F5.A.FF282F44 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Generic.Dacic.2C5202F5.A.FF282F44?


File Info:

name: E36397A50078040EE9A4.mlw
path: /opt/CAPEv2/storage/binaries/e7122f159c10dd1bec897b8d7b158691fa2096ba3283efc069cd9c2b8ccd63cc
crc32: FB0982E0
md5: e36397a50078040ee9a4d9c26d1e6b60
sha1: 9e8e39cd88d936d6d2aaabf2f33d37aa39133e38
sha256: e7122f159c10dd1bec897b8d7b158691fa2096ba3283efc069cd9c2b8ccd63cc
sha512: e96b8c00ca76af075f56def5d11d45650135b8d93ee9f6c7773fbdd747c364dd7868ff78aa3cc250a0793c7510e032b34f21f800629e6022cdfa257506d9b128
ssdeep: 12288:h7NoFUFLWVKPvaFevYVQ5zCD4TyWN9VysX7ryTkFprVf:h7N7YVKPvaFevYVQ5zY4xN9VyUUkFpRf
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T17AD4BD6D7F498F67DDEE31F10806754A8189B3978AAF5280EC5054343CEE98CF2BE516
sha3_384: a1542af3c4995891d8042ddb5fd5570230e926b729e3b8c205ec3e0c2054cc6040d8cdfe10d95aaa87c84cd14bb7d45b
ep_bytes: 7d7759a32d1edd2428ffd4b53abdbc0f
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Generic.Dacic.2C5202F5.A.FF282F44 also known as:

BkavW32.AIDetectMalware
MicroWorld-eScanGeneric.Dacic.2C5202F5.A.FF282F44
ClamAVWin.Packed.Razy-9828382-0
FireEyeGeneric.mg.e36397a50078040e
SkyhighBehavesLike.Win32.Glupteba.jc
ALYacGeneric.Dacic.2C5202F5.A.FF282F44
MalwarebytesGeneric.Malware.AI.DDS
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
Cybereasonmalicious.d88d93
ArcabitGeneric.Dacic.2C5202F5.A.FF282F44
BitDefenderThetaGen:NN.ZexaF.36608.N4Z@a4E3noi
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.GIRH
APEXMalicious
CynetMalicious (score: 100)
KasperskyVHO:Trojan.Win32.Copak.gen
BitDefenderGeneric.Dacic.2C5202F5.A.FF282F44
NANO-AntivirusTrojan.Win32.Agent.hsgebg
AvastWin32:TrojanX-gen [Trj]
TencentMalware.Win32.Gencirc.13f8db24
EmsisoftApplication.Generic (A)
F-SecureTrojan.TR/Crypt.ZPACK.Gen
VIPREGeneric.Dacic.2C5202F5.A.FF282F44
Trapminemalicious.moderate.ml.score
SophosTroj/Agent-BFEY
IkarusTrojan-Downloader.Win32.FakeAlert
GoogleDetected
AviraTR/Crypt.ZPACK.Gen
MAXmalware (ai score=86)
Antiy-AVLTrojan/Win32.Kryptik.girh
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Glupteba.MT!MTB
ZoneAlarmVHO:Trojan.Win32.Copak.gen
GDataWin32.Trojan.PSE.1VBSYDL
VaristW32/Trojan.NJGF-3047
AhnLab-V3Packed/Win.FJB.C5537715
Acronissuspicious
McAfeeTrojan-FVOQ!E36397A50078
TACHYONTrojan/W32.Selfmod
VBA32Trojan.Khalesi
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.B34D (CLASSIC)
SentinelOneStatic AI – Malicious PE
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:TrojanX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Generic.Dacic.2C5202F5.A.FF282F44?

Generic.Dacic.2C5202F5.A.FF282F44 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment