Malware

Should I remove “Heur.Munp.1”?

Malware Removal

The Heur.Munp.1 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Heur.Munp.1 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Behavioural detection: Transacted Hollowing
  • CAPE detected the embedded win api malware family
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Heur.Munp.1?


File Info:

name: B0D4EEF4CD5422BBB4F1.mlw
path: /opt/CAPEv2/storage/binaries/331c56e6d2fcb9d9764514cbb4af50d67de6e5d565014c26cfc55718d1ef1dff
crc32: 972BB022
md5: b0d4eef4cd5422bbb4f15ff587663711
sha1: 9fe850f869143a1d155e06c04b4bf8c2cf8f40a9
sha256: 331c56e6d2fcb9d9764514cbb4af50d67de6e5d565014c26cfc55718d1ef1dff
sha512: 45990c40bfbf368b10970b223e3ddff92f466ecbeafe9b03cd4094f4e6912496f9cab402f9a55f515bbd674f913d97f2e959e627974d93f1815ff4db14fdbde2
ssdeep: 98304:YieRe1jcXAX8TvG/b9MiZ8byH0LDAro1uD63VJlQj2GDVglSxO/BOssBcBfBEt3R:Be3A+wb+iziAbD6lsJhgtEssy8w0x
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1875633272F058FBCCA22A93C8D2BD7D81136F4A68E39511935FDBB988FB6F9160115C4
sha3_384: 551a0386b30eb138ab3471b0aa4423c7548d057ab85565e4e90f583596ffeb0e41436cd60de01826dbc7685cf20207fd
ep_bytes: 558bec83c4d453565733c08945f08945
timestamp: 2024-01-10 14:36:10

Version Info:

Comments: This installation was built with Inno Setup: http://www.innosetup.com
CompanyName:
FileDescription: VB Sound Blaster crt module Setup
FileVersion:
InternalName:
OriginalFilename:
ProductName:
ProductVersion:
Translation: 0x0409 0x04e4

Heur.Munp.1 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Ekstak.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Heur.Munp.1
FireEyeGen:Heur.Munp.1
SkyhighBehavesLike.Win32.Dropper.tc
McAfeeArtemis!B0D4EEF4CD54
Cylanceunsafe
SangforDropper.Win32.Ekstak.V80t
AlibabaTrojanDropper:Win32/Ekstak.6841e0f4
ArcabitTrojan.Munp.1
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 100)
APEXMalicious
KasperskyTrojan.Win32.Ekstak.auxsu
BitDefenderGen:Heur.Munp.1
AvastWin32:Evo-gen [Trj]
TencentWin32.Trojan.Ekstak.Bdhl
EmsisoftGen:Heur.Munp.1 (B)
F-SecureTrojan.TR/AD.Nekark.grpll
VIPREGen:Heur.Munp.1
Trapminemalicious.moderate.ml.score
SophosMal/Generic-S
IkarusTrojan.Win32.Crypt
JiangminTrojan.Ekstak.cimi
VaristW32/Agent.KMCG-2605
AviraTR/AD.Nekark.grpll
MicrosoftTrojan:Win32/Wacatac.B!ml
ZoneAlarmTrojan.Win32.Ekstak.auxsu
GDataWin32.Trojan.PSE.SRMNXW
AhnLab-V3Trojan/Win.Evo-gen.R630998
MAXmalware (ai score=80)
MalwarebytesGeneric.Malware/Suspicious
PandaTrj/Chgt.AD
TrendMicro-HouseCallTROJ_GEN.R002H0CAA24
SentinelOneStatic AI – Suspicious PE
FortinetW32/Agent.SLC!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Heur.Munp.1?

Heur.Munp.1 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment