Malware

About “Generic.MSIL.PasswordStealerA.025F3249” infection

Malware Removal

The Generic.MSIL.PasswordStealerA.025F3249 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Generic.MSIL.PasswordStealerA.025F3249 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Starts servers listening on 127.0.0.1:0
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Sniffs keystrokes
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Exhibits behavior characteristics of HawkEye keylogger.
  • Collects and encrypts information about the computer likely to send to C2 server
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Attempts to modify Explorer settings to prevent hidden files from being displayed

How to determine Generic.MSIL.PasswordStealerA.025F3249?


File Info:

name: 692CC739980674724A07.mlw
path: /opt/CAPEv2/storage/binaries/f622765e79d60c93d6dcb804f0009053880040e78d09a584a54bed6a9d668ef6
crc32: 60828FA0
md5: 692cc739980674724a07e7e9d4ba7c02
sha1: 3a29f1b9e56063cb9e671c770f8e5b82816c35e0
sha256: f622765e79d60c93d6dcb804f0009053880040e78d09a584a54bed6a9d668ef6
sha512: 0dcbc97bc01798b798710599f73c7ba15b66f9590b281822a41da67822a25612ddde95844812483c3b122e1828f1542f7ead9a088229912b26f328b7a11d8137
ssdeep: 12288:joL4EnU4T/vjLUj+C1DXBnPmjFLXpBfoNP:jwnU4TDLUj+ChBPmjFbzfoNP
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T10EA401113481C172C477507048EACB765E3A7521077A96E777ED27BA6F303E1A73A2CA
sha3_384: d27b80621fb85a0bff8ad1444e5c9e38cf425a3e5253be10c218106b05b5705cc010db39c33461bd997d23c0d9cb26ef
ep_bytes: e8e15c0000e9a4feffff8bff558bec83
timestamp: 2022-06-13 17:11:38

Version Info:

Translation: 0x0000 0x04b0
FileDescription: Microsoft
FileVersion: 1.0.0.0
InternalName: Microsoft.exe
LegalCopyright: Copyright © 2013
OriginalFilename: Microsoft.exe
ProductName: Microsoft
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

Generic.MSIL.PasswordStealerA.025F3249 also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
McAfeeGeneric BackDoor.adv
MalwarebytesTrojan.FakeMS.Gen
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_60% (D)
BitDefenderDeepScan:Generic.MSIL.PasswordStealerA.025F3249
ESET-NOD32a variant of MSIL/Autorun.Spy.Agent.BT
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
MicroWorld-eScanDeepScan:Generic.MSIL.PasswordStealerA.025F3249
Ad-AwareDeepScan:Generic.MSIL.PasswordStealerA.025F3249
SophosMal/Behav-421
McAfee-GW-EditionBehavesLike.Win32.Generic.gc
Trapminemalicious.high.ml.score
FireEyeDeepScan:Generic.MSIL.PasswordStealerA.025F3249
EmsisoftDeepScan:Generic.MSIL.PasswordStealerA.025F3249 (B)
IkarusWorm.MSIL.Autorun
GDataDeepScan:Generic.MSIL.PasswordStealerA.025F3249
WebrootW32.Malware.gen
AviraTR/AD.MExecute.lzrac
MAXmalware (ai score=87)
ArcabitDeepScan:Generic.MSIL.PasswordStealerA.025F3249
SUPERAntiSpywareTrojan.Agent/Gen-Tester
MicrosoftHackTool:Win32/Mailpassview
AhnLab-V3Trojan/Win32.Agent.R176805
ALYacDeepScan:Generic.MSIL.PasswordStealerA.025F3249
TACHYONTrojan/W32.Bladabindi.478208
VBA32Trojan.MSIL.gen.11
CylanceUnsafe
RisingTrojan.Generic@AI.100 (RDML:UvCvAZWK4TSRujx3hcEBpw)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
BitDefenderThetaGen:NN.ZexaF.34712.Dq0@ai6tavc
Cybereasonmalicious.998067

How to remove Generic.MSIL.PasswordStealerA.025F3249?

Generic.MSIL.PasswordStealerA.025F3249 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment