Malware

Johnnie.158280 malicious file

Malware Removal

The Johnnie.158280 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Johnnie.158280 virus can do?

  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Creates known Njrat/Bladabindi RAT registry keys
  • Binary compilation timestomping detected

How to determine Johnnie.158280?


File Info:

name: 652C76BF2290B92998F8.mlw
path: /opt/CAPEv2/storage/binaries/834427f2ccf622aec67acccfee7e56158c2639f89aa9d6d27061c676700aaa3d
crc32: 2FD80B8F
md5: 652c76bf2290b92998f8c99f97c22390
sha1: 96319bcae824c6fcc8d4c8bd267da1fe858d6742
sha256: 834427f2ccf622aec67acccfee7e56158c2639f89aa9d6d27061c676700aaa3d
sha512: 1e3af32fdbb082d10e254be8a649fe87399e9fdc9cb00ac838605b1da070c905143452f4750b1da69e6c6ff87bfa606397e8dcf059f4a741d38e01074a0b83ab
ssdeep: 6144:BiB6///////////////////////////////////////////////////////////p:BTT/E
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T11844109458FE80CAF3255F324BE5FD6ED595EC33BC2896AED088BA024733685481B735
sha3_384: a20175672b6ac6974248bcc6b0a113eceb8d5b5fd81f30f1f121457075218c86cf44e1deb8eb2e43cae19b95dd1b3cde
ep_bytes: ff250020400000000000000000000000
timestamp: 2096-08-24 15:57:41

Version Info:

Translation: 0x0000 0x04b0
Comments: igfxHK Module
CompanyName:
FileDescription: igfxHK
FileVersion: 1.0.0.0
InternalName: igfxHK.exe
LegalCopyright: Copyright © 2019
LegalTrademarks: Intel Corporation
OriginalFilename: igfxHK.exe
ProductName: igfxHK
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

Johnnie.158280 also known as:

BkavW32.AIDetectNet.01
LionicTrojan.MSIL.Disfa.4!c
MicroWorld-eScanGen:Variant.Johnnie.158280
McAfeeArtemis!652C76BF2290
CylanceUnsafe
ZillyaTrojan.Kryptik.Win32.1590766
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 004d89911 )
BitDefenderGen:Variant.Johnnie.158280
K7GWTrojan ( 004d89911 )
CrowdStrikewin/malicious_confidence_100% (W)
ArcabitTrojan.Johnnie.D26A48
SymantecBackdoor.Ratenjay
Elasticmalicious (high confidence)
ESET-NOD32a variant of MSIL/Kryptik.EMQ
CynetMalicious (score: 100)
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Trojan.MSIL.Disfa.gen
AlibabaTrojan:MSIL/Disfa.bb5985c4
NANO-AntivirusTrojan.Win32.Kryptik.fmqlgh
RisingTrojan.Generic/MSIL@AI.100 (RDM.MSIL:D23NGTscj8RhNUBoUIjM7Q)
Ad-AwareGen:Variant.Johnnie.158280
SophosML/PE-A
ComodoMalware@#3uxcjhojrah8m
DrWebBackDoor.Bladabindi.13678
VIPREGen:Variant.Johnnie.158280
McAfee-GW-EditionArtemis!Trojan
Trapminesuspicious.low.ml.score
FireEyeGeneric.mg.652c76bf2290b929
EmsisoftGen:Variant.Johnnie.158280 (B)
JiangminTrojan.MSIL.ouls
AviraTR/Dropper.Gen
MAXmalware (ai score=87)
Antiy-AVLTrojan/Generic.ASMalwS.19D4
MicrosoftTrojan:MSIL/Bladabindi.DJ!MTB
GDataGen:Variant.Johnnie.158280
Acronissuspicious
BitDefenderThetaGen:NN.ZemsilF.34726.pm0@aaJsESf
ALYacGen:Variant.Johnnie.158280
MalwarebytesMachineLearning/Anomalous.94%
PandaTrj/GdSda.A
TencentMsil.Trojan.Disfa.Hajl
YandexTrojan.Disfa!jp1yStUhHac
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.73686406.susgen
FortinetMSIL/GenKryptik.CJDJ!tr
AVGWin32:Trojan-gen
Cybereasonmalicious.f2290b
AvastWin32:Trojan-gen

How to remove Johnnie.158280?

Johnnie.158280 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment