Malware

Mal/Generic-R + Troj/Mdrop-DHL removal instruction

Malware Removal

The Mal/Generic-R + Troj/Mdrop-DHL is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Mal/Generic-R + Troj/Mdrop-DHL virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Code injection with CreateRemoteThread in a remote process
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Steals private information from local Internet browsers
  • Collects and encrypts information about the computer likely to send to C2 server
  • Attempts to modify browser security settings
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Clears web history

How to determine Mal/Generic-R + Troj/Mdrop-DHL?


File Info:

name: CB42423EFB9E95175F6F.mlw
path: /opt/CAPEv2/storage/binaries/32546a32aaf236c32b49453fc8a9f1aed1a30f737159aa119270eabe2810c6ec
crc32: BB87EF85
md5: cb42423efb9e95175f6f203dbd21ab29
sha1: b37d6697593ce253fd2aa775dbfbb0f79757a7d4
sha256: 32546a32aaf236c32b49453fc8a9f1aed1a30f737159aa119270eabe2810c6ec
sha512: 959167c96780baa4a2758fdd9be7019b082c3af51853e75ec4b18ed9393739e93998c1dde648dc9984256f3cbb15558ca5f0f2592873f42a595ac2439a4aea92
ssdeep: 1536:x/1Mr8aaQQhpReBdhh2p289i2CcOdhEr+XEyD+Lfnro3r9efqicRD5Rh397ZRM8z:1/hEhf2VOdhEr6dDWr2r9Ricn39bMa
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T128D32383476B1DDBCEA2A9F1496CFE8A89ECF29086F488C90C155DCFBCC57B1591095C
sha3_384: d5bb61eb1579f9f0c69a14217dac8da775b721dafe24db25ac5d9a29241aa2b00cac7bd7ae1adebe479174c874818ce5
ep_bytes: 60be15b040008dbeeb5fffff57eb0b90
timestamp: 2006-03-18 07:42:59

Version Info:

CompanyName: Vxtck Ipiuqj
FileDescription: Vxtck Jhnvjxg Qcepavh
FileVersion: 27, 64, 122, 116
InternalName: Vxtck
LegalCopyright: Copyright © Vxtck Ipiuqj 2001-2011
OriginalFilename: Vxtck.exe
ProductName: Vxtck Jhnvjxg Qcepavh
ProductVersion: 96, 20, 47, 108
Translation: 0x0409 0x04e4

Mal/Generic-R + Troj/Mdrop-DHL also known as:

BkavW32.MosquitoQKK.Fam.Trojan
Elasticmalicious (high confidence)
ClamAVWin.Trojan.Zbot-31514
FireEyeGeneric.mg.cb42423efb9e9517
CAT-QuickHealWorm.SlenfBot.Gen
ALYacGen:Heur.VIZ.!e!.1
ZillyaTrojan.Zbot.Win32.31762
SangforTrojan.Win32.Spy.Zbot
K7AntiVirusTrojan ( f1000f011 )
BitDefenderGen:Heur.VIZ.!e!.1
K7GWTrojan ( f1000f011 )
Cybereasonmalicious.efb9e9
BitDefenderThetaGen:NN.ZexaF.34212.imLfaeVw2rlc
VirITTrojan.Win32.Packed.BFTR
CyrenW32/Zbot.CN.gen!Eldorado
SymantecW32.Qakbot!gen5
ESET-NOD32Win32/Spy.Zbot.ZR
TrendMicro-HouseCallBKDR_QAKBOT.SMG
AvastWin32:Malware-gen
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
AlibabaTrojanPSW:Win32/Mdrop.913880aa
NANO-AntivirusTrojan.Win32.Zbot.imxjh
ViRobotSpyware.Zbot.136848
MicroWorld-eScanGen:Heur.VIZ.!e!.1
RisingSpyware.Zbot!8.16B (CLOUD)
Ad-AwareGen:Heur.VIZ.!e!.1
SophosMal/Generic-R + Troj/Mdrop-DHL
ComodoTrojWare.Win32.TrojanSpy.Zbot.G@2tckk5
DrWebTrojan.Packed.21467
VIPRETrojan.Win32.Kryptik.lbu (v)
TrendMicroBKDR_QAKBOT.SMG
EmsisoftGen:Heur.VIZ.!e!.1 (B)
APEXMalicious
JiangminTrojanSpy.Zbot.awbd
WebrootW32.Trojan.Gen
AviraTR/Spy.Zbot.auo
Antiy-AVLTrojan/Generic.ASMalwS.91C44
KingsoftWin32.Heur.KVMH019.a.(kcloud)
MicrosoftTrojan:Win32/Bagsu!rfn
SUPERAntiSpywareTrojan.Agent/Gen-Cryptic
GDataGen:Heur.VIZ.!e!.1
SentinelOneStatic AI – Malicious PE
AhnLab-V3Trojan/Win32.FraudPack.R3415
McAfeeW32/Pinkslipbot.gen.af
TACHYONTrojan-Spy/W32.ZBot.161424
VBA32Trojan.Zeus.EA.0999
PandaGeneric Malware
TencentWin32.Trojan.Spy.Szbe
MAXmalware (ai score=100)
FortinetW32/Kryptik.NAS!tr
AVGWin32:Malware-gen
CrowdStrikewin/malicious_confidence_70% (W)

How to remove Mal/Generic-R + Troj/Mdrop-DHL?

Mal/Generic-R + Troj/Mdrop-DHL removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment