Malware

Should I remove “Malware.AI.3880537775”?

Malware Removal

The Malware.AI.3880537775 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Malware.AI.3880537775 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Presents an Authenticode digital signature
  • Dynamic (imported) function loading detected
  • Unconventionial language used in binary resources: Icelandic
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Network activity detected but not expressed in API logs

Related domains:

wpad.local-net
repository.certum.pl

How to determine Malware.AI.3880537775?


File Info:

name: 56D17B08920ADC1164D9.mlw
path: /opt/CAPEv2/storage/binaries/f15188ab30b3ee7e7ea7e5eaafe673eb81b79dd8994093db11dbbe4e0d6ff067
crc32: 92A7DFC1
md5: 56d17b08920adc1164d9a79ff9233fa2
sha1: 23e7e7be837cf92b96cc539145c49d766af5bd54
sha256: f15188ab30b3ee7e7ea7e5eaafe673eb81b79dd8994093db11dbbe4e0d6ff067
sha512: f3f4785cc5ed68046cbc5f2866b8c2eee0725145c65923ef3641658d697103320dec6ef7ecba0c2c46b40514e9a160750ee7b5e4a3b907ba0e792f6b404a3059
ssdeep: 24576:hSocGeBil/hnJtvvg87JFiJ7Y0bZmjMVVuckJjXAKjOt5NTYY:Hoi5hJtvvn7JUrbTocklAKQT
type: PE32+ executable (console) x86-64, for MS Windows
tlsh: T126555A629ADC1CA9C4E680F9C5528906F1F2B8564751F3E712AC1F2E2E1FAC1C73E761
sha3_384: 382e2e553e2086034cd87d6d2ee7b05efc12b29e9dd3ab4590889202b12f8ce654047c23734d31d0a3d082800bb1aad5
ep_bytes: 4883ec28e8bf0500004883c428e976fe
timestamp: 2019-02-01 11:18:22

Version Info:

CompanyName: ElapseLab.
FileDescription: ElapseLab
FileVersion: 1.0.2.8
InternalName: elapselab.exe
LegalCopyright: ElapseLab. 2019
OriginalFilename: elapselab.exe
ProductName: ElapseLab
ProductVersion: 1.0.2.8
Translation: 0x040f 0x04b0

Malware.AI.3880537775 also known as:

LionicRiskware.Win64.CoinMiner.1!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Application.BitCoinMiner.IdleBuddy.2
FireEyeGeneric.mg.56d17b08920adc11
McAfeeArtemis!56D17B08920A
MalwarebytesMalware.AI.3880537775
VIPREWin64.Adware.OpenSUpdater
SangforTrojan.Win32.Save.a
AlibabaRiskWare:Win64/CoinMiner.1727924c
Cybereasonmalicious.8920ad
CyrenW64/OpenSUpdater.I.gen!Eldorado
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of Win64/Adware.OpenSUpdater.A
TrendMicro-HouseCallTROJ_GEN.R002H0CKN21
Kasperskynot-a-virus:HEUR:RiskTool.Win64.CoinMiner.gen
BitDefenderGen:Variant.Application.BitCoinMiner.IdleBuddy.2
AvastWin64:AdwareX-gen [Adw]
TencentWin64.Adware.Opensupdater.Sxyf
Ad-AwareGen:Variant.Application.BitCoinMiner.IdleBuddy.2
SophosGeneric PUA CD (PUA)
ComodoApplicUnwnt@#5e0l4bxqnlq8
McAfee-GW-EditionArtemis
SentinelOneStatic AI – Malicious PE
EmsisoftGen:Variant.Application.BitCoinMiner.IdleBuddy.2 (B)
APEXMalicious
GDataGen:Variant.Application.BitCoinMiner.IdleBuddy.2
AviraHEUR/AGEN.1108436
ArcabitTrojan.Application.BitCoinMiner.IdleBuddy.2
MicrosoftPUADlManager:Win32/OpenDownloadManager
CynetMalicious (score: 100)
Acronissuspicious
ALYacGen:Variant.Application.BitCoinMiner.IdleBuddy.2
MAXmalware (ai score=78)
CylanceUnsafe
YandexTrojan.GenAsa!KbCqxXcXMHs
IkarusAdWare.Opensupdater
MaxSecureTrojan.Malware.74246856.susgen
FortinetAdware/OpenSUpdater
AVGWin64:AdwareX-gen [Adw]
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Malware.AI.3880537775?

Malware.AI.3880537775 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment