Malware

About “Mal/Generic-R + Troj/Remcos-DI” infection

Malware Removal

The Mal/Generic-R + Troj/Remcos-DI is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Mal/Generic-R + Troj/Remcos-DI virus can do?

  • Attempts to connect to a dead IP:Port (1 unique times)
  • A process created a hidden window
  • Drops a binary and executes it
  • Uses Windows utilities for basic functionality
  • Sniffs keystrokes
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself

Related domains:

z.whorecord.xyz
a.tomx.xyz
sandshoe.myfirewall.org

How to determine Mal/Generic-R + Troj/Remcos-DI?


File Info:

crc32: 168AC322
md5: eefab6a739efad4b904ee832f9179985
name: EEFAB6A739EFAD4B904EE832F9179985.mlw
sha1: 172d4f50e1bec7397dfd3e4d7bc8f77a7edf7f12
sha256: 2ec6290d441133c90bcc14766454fbb8184fefd96d4a68912158cd673be1a897
sha512: aeb97c6672658fc02581ca311642d7219abf02c1c2191c35b7de239aef88e217e5e52d6d0ac63ca1f66097b57504fd677985f7251f4083b756671d8423b5679d
ssdeep: 1536:4hhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESHNTh9E+JP19qkP6ErY:ehzYTGWVvJ8f2v1TbPzuMsIFSHNThy+8
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Mal/Generic-R + Troj/Remcos-DI also known as:

BkavW32.FamVT.RevetAF.Trojan
Elasticmalicious (high confidence)
ClamAVWin.Malware.Rescoms-6598304-0
CAT-QuickHealTrojan.Mauvaise.SL1
McAfeeTrojan-FOFQ!EEFAB6A739EF
MalwarebytesBackdoor.Remcos
AegisLabTrojan.Win32.Generic.4!c
K7AntiVirusTrojan ( 004f67651 )
BitDefenderTrojan.Inject.BDT
K7GWTrojan ( 004f67651 )
Cybereasonmalicious.739efa
ArcabitTrojan.Inject.BDT
CyrenW32/Injector.AKNB-1880
SymantecInfostealer!im
APEXMalicious
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
AlibabaBackdoor:Win32/Rescoms.81ecd2f7
NANO-AntivirusTrojan.Win32.AD.erfeyu
SUPERAntiSpywareBackdoor.Remcos/Variant
MicroWorld-eScanTrojan.Inject.BDT
TencentMalware.Win32.Gencirc.10b097e0
Ad-AwareTrojan.Inject.BDT
SophosMal/Generic-R + Troj/Remcos-DI
ComodoTrojWare.Win32.Rescoms.A@70v67g
F-SecureHeuristic.HEUR/AGEN.1115265
DrWebTrojan.DownLoader25.11684
ZillyaTrojan.Agent.Win32.742092
TrendMicroBKDR_SOCMER.SM
McAfee-GW-EditionBehavesLike.Win32.Agent.nh
FireEyeGeneric.mg.eefab6a739efad4b
EmsisoftTrojan.Inject.BDT (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.bgmwv
WebrootW32.Malware.gen
AviraHEUR/AGEN.1115265
MAXmalware (ai score=82)
GridinsoftBackdoor.Win32.Gen.cc!s1
MicrosoftBackdoor:Win32/Rescoms
ViRobotTrojan.Win32.Agent.94208.EA
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataWin32.Malware.Bucaspys.B
AhnLab-V3Backdoor/Win32.Rescoms.R198292
Acronissuspicious
VBA32BScope.Trojan.Downloader
ALYacTrojan.Inject.BDT
TACHYONBackdoor/W32.Agent.94208.GG
CylanceUnsafe
PandaTrj/Genetic.gen
ZonerTrojan.Win32.76707
ESET-NOD32Win32/Agent.RXL
TrendMicro-HouseCallBKDR_SOCMER.SM
RisingBackdoor.Remcos!1.B4AD (CLASSIC)
YandexTrojan.GenAsa!7DchS5duLaA
IkarusBackdoor.Win32.Rescoms
eGambitUnsafe.AI_Score_100%
FortinetW32/Agent.RXL!tr
BitDefenderThetaGen:NN.ZexaF.34658.fqW@auK!FKbi
AVGWin32:RemcosRAT-A [Trj]
AvastWin32:RemcosRAT-A [Trj]
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360Win32/Trojan.8cf

How to remove Mal/Generic-R + Troj/Remcos-DI?

Mal/Generic-R + Troj/Remcos-DI removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment