Malware

About “Generic.MSIL.Bladabindi.01C2FC41” infection

Malware Removal

The Generic.MSIL.Bladabindi.01C2FC41 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Generic.MSIL.Bladabindi.01C2FC41 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Executable displays a decoy image
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Sniffs keystrokes
  • Created a process from a suspicious location
  • CAPE detected the njRat malware family
  • Creates known Njrat/Bladabindi RAT registry keys

How to determine Generic.MSIL.Bladabindi.01C2FC41?


File Info:

name: AF53AD34EB2530ED4017.mlw
path: /opt/CAPEv2/storage/binaries/0814eb61dd0d722be1c40e06dcfa23d99c640adbf0f64571c352ba4650f76276
crc32: 4A386ACC
md5: af53ad34eb2530ed4017c9d9a73af7ae
sha1: eb7d392956a3a47fd8fbf5780a39d180188a4928
sha256: 0814eb61dd0d722be1c40e06dcfa23d99c640adbf0f64571c352ba4650f76276
sha512: a2243476991d57bd7e07d24771bef0554ffb2a5298db5b7017e915031e1d797d1a8c32ccb67c72e645671b6a266457c9e2b9b46f6c8ba38ddff5505d2641b2c4
ssdeep: 24576:D2G/nvxW3WOLxmNAwwABI2SYWHQBt3vQfugChG2x:DbA3fLANAwwJ2vWHWBQtW
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1A815DF656ED618A7C2921B751BF0B738C2FCABE13E378E0BD6322549F934CC5B610586
sha3_384: 7bc82c4619476658d7135a81024da72bd7024cafd73c2bd06f2f4c36102dc27bdbc9d28ef8f6955e81bf972265fee1a5
ep_bytes: e874040000e988feffff3b0d68e64300
timestamp: 2020-12-01 18:00:55

Version Info:

0: [No Data]

Generic.MSIL.Bladabindi.01C2FC41 also known as:

BkavW32.AIDetect.malware2
tehtrisGeneric.Malware
K7AntiVirusTrojan ( 7000001c1 )
BitDefenderGeneric.MSIL.Bladabindi.01C2FC41
Cybereasonmalicious.4eb253
BaiduMSIL.Backdoor.Bladabindi.a
CyrenW32/MSIL_Troj.AP.gen!Eldorado
Elasticmalicious (high confidence)
ESET-NOD32a variant of MSIL/Bladabindi.LX
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
MicroWorld-eScanGeneric.MSIL.Bladabindi.01C2FC41
RisingBackdoor.njRAT!1.9E49 (CLASSIC)
SophosGeneric ML PUA (PUA)
F-SecureTrojan.TR/Dropper.Gen
TrendMicroBKDR_BLADABI.SMC
McAfee-GW-EditionBehavesLike.Win32.Generic.dc
FireEyeGeneric.mg.af53ad34eb2530ed
EmsisoftGeneric.MSIL.Bladabindi.01C2FC41 (B)
IkarusPUA.VMProtect
GDataMSIL.Trojan-Spy.Bladabindi.BQ
AviraTR/Dropper.Gen
ArcabitGeneric.MSIL.Bladabindi.01C2FC41
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftBackdoor:MSIL/Bladabindi.AJ
AhnLab-V3Trojan/Win32.RL_Generic.R362408
Acronissuspicious
ALYacGeneric.MSIL.Bladabindi.01C2FC41
MAXmalware (ai score=83)
MalwarebytesBladabindi.Backdoor.Njrat.DDS
TrendMicro-HouseCallBKDR_BLADABI.SMC
SentinelOneStatic AI – Malicious SFX
MaxSecureTrojan.Malware.300983.susgen
FortinetMSIL/Bladabindi.LX!tr
BitDefenderThetaGen:NN.ZemsilF.34606.ruW@au41u!d
AVGWin32:RATX-gen [Trj]
AvastWin32:RATX-gen [Trj]

How to remove Generic.MSIL.Bladabindi.01C2FC41?

Generic.MSIL.Bladabindi.01C2FC41 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment