Malware

Graftor.39788 removal tips

Malware Removal

The Graftor.39788 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Graftor.39788 virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Expresses interest in specific running processes
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)

How to determine Graftor.39788?


File Info:

name: BBEBEC0852DE8F056AA9.mlw
path: /opt/CAPEv2/storage/binaries/a4317cb67f99c6052195677854e7ac78f5b7e03163bde592b65fbce20261cf70
crc32: BBA2F204
md5: bbebec0852de8f056aa99da5c503d80f
sha1: ca285336c7bae1cc23f4e80c5a1125af4faf6a0f
sha256: a4317cb67f99c6052195677854e7ac78f5b7e03163bde592b65fbce20261cf70
sha512: 6e4f50030996f946501a656c84a8890037e7269872db44590df474312efd2dc5e431d5de15a8bc6a7e81672cb4a4bf1648d21bb7fc04f3bf03805d42c946875e
ssdeep: 6144:JJjXLn9GXptZroHX04IPpUOWfZWxANjmvVWR1MzYg7wAfVCDm9:JN56oqKRWxIjCVgMzEAfVCa9
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T15C641250FDC36CD6C4E426BA4963C67DA3A9D522E4B54BCBC04079331FF62194869FE1
sha3_384: e5366d65b3779e2d7bbf797fd79335e7aa4a4fa21b3a0c80f97750db630ab8b0ab1d478955fe57d087d407ad7bedaded
ep_bytes: 60be00e044008dbe0030fbffc7879c30
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Graftor.39788 also known as:

LionicTrojan.Win32.Generic.4!c
MicroWorld-eScanGen:Variant.Graftor.39788
FireEyeGeneric.mg.bbebec0852de8f05
CAT-QuickHealTrojanPWS.Zbot.Gen
McAfeeArtemis!BBEBEC0852DE
CylanceUnsafe
SangforSpyware.Win32.SpyEye.CA
K7AntiVirusRiskware ( 0015e4f01 )
K7GWRiskware ( 0015e4f01 )
Cybereasonmalicious.852de8
SymantecML.Attribute.HighConfidence
Elasticmalicious (moderate confidence)
ESET-NOD32Win32/Spy.SpyEye.CA
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Graftor.39788
NANO-AntivirusTrojan.Win32.SpyEye.whyrn
AvastWin32:Zbot-PDR [Trj]
TencentWin32.Trojan.Generic.Pjxj
Ad-AwareGen:Variant.Graftor.39788
EmsisoftGen:Variant.Graftor.39788 (B)
ComodoMalware@#2k5oiglibr4ub
McAfee-GW-EditionBehavesLike.Win32.Backdoor.fc
Trapminemalicious.high.ml.score
SophosMal/EncPk-AFT
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Graftor.39788
JiangminTrojan/Generic.aijvd
WebrootTrojan.Dropper.Gen
AviraTR/Crypt.ZPACK.Gen
MAXmalware (ai score=84)
KingsoftWin32.Troj.Undef.(kcloud)
ArcabitTrojan.Graftor.D9B6C
MicrosoftTrojan:Win32/EyeStye.N
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Zbot.R216706
BitDefenderThetaGen:NN.ZelphiF.34742.smGfayOpcRk
ALYacGen:Variant.Graftor.39788
VBA32TScope.Trojan.Delf
MalwarebytesMalware.Heuristic.1003
RisingSpyware.SpyEye!8.271 (CLOUD)
YandexTrojan.GenAsa!tFbe9OOIhHo
IkarusTrojan.SuspectCRC
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Zbot.AKE!tr
AVGWin32:Zbot-PDR [Trj]
PandaGeneric Malware
CrowdStrikewin/malicious_confidence_60% (D)

How to remove Graftor.39788?

Graftor.39788 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment