Malware

Malware.AI.402571378 removal instruction

Malware Removal

The Malware.AI.402571378 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Malware.AI.402571378 virus can do?

  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Uses Windows utilities for basic functionality
  • Performs HTTP requests potentially not found in PCAP.
  • Reads data out of its own binary image
  • Executed a very long command line or script command which may be indicative of chained commands or obfuscation
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • A scripting utility was executed
  • A ping command was executed with the -n argument possibly to delay analysis
  • Detects the presence of Wine emulator via registry key
  • Attempts to modify proxy settings
  • Deletes executed files from disk
  • Touches a file containing cookies, possibly for information gathering
  • Uses suspicious command line tools or Windows utilities
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Malware.AI.402571378?


File Info:

name: 024728172530397527E0.mlw
path: /opt/CAPEv2/storage/binaries/dfc76d29b790dc952c34e36f21ab65fbc9060b9cb759f40023322f097a108d45
crc32: 8B39EA1C
md5: 024728172530397527e074990c3b4b24
sha1: d877f04f7a407450fe0b0a30589149cbc7ef09ee
sha256: dfc76d29b790dc952c34e36f21ab65fbc9060b9cb759f40023322f097a108d45
sha512: e38ea8f6d050ebc518efa81fcc85ea4a8861939b512772a623ba14aa71996bb9335d024d796dbb500053af58cdcb49efddeb1f1af13d7140c270685c586ed436
ssdeep: 49152:l3oQMDfDRPC3a3+ARdjQlkkU/jrZ28VwlLUA6e/jzMq3s53wxG5s4l/p:6jlPCq399QlK/jU8Vwdd8qzR4L
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T195C52394C916692AC7DD2577604F2ECE1472ED04A2685E23A831317FBB321E77B30D9B
sha3_384: 39c273c0d11db5a0838665d924186ba76abf1ac4e822897dba8e00d1e9386a01494f13af39a2bbf152b596e7de20b32f
ep_bytes: 60be00907d008dbe0080c2ff5789e58d
timestamp: 2016-05-12 20:43:04

Version Info:

CompanyName: BitTorrent Inc.
FileDescription: µTorrent
FileVersion: 3.4.8.42344
InternalName: uTorrent.exe
OriginalFilename: uTorrent.exe
LegalCopyright: ©2016 BitTorrent, Inc. All Rights Reserved.
ProductName: µTorrent
ProductVersion: 3.4.8.42344
SpecialBuild: onboarding
Translation: 0x0409 0x04e4

Malware.AI.402571378 also known as:

MalwarebytesMalware.AI.402571378
SangforPUP.Win32.Utorrent.Vqa5
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/uTorrent.C potentially unwanted
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Virus.Pioneer-6622830-0
RisingPUF.OpenCandy!8.224 (CLOUD)
DrWebAdware.OpenCandy.248
TrendMicroTROJ_GEN.R002C0OF421
SophosGeneric ML PUA (PUA)
IkarusPUA.uTorrent
MicrosoftPUABundler:Win32/CandyOpen
XcitiumApplicUnwnt@#3cvjesfnrdi46
GDataWin32.Application.OpenCandy.R
GoogleDetected
MAXmalware (ai score=99)
Cylanceunsafe
TrendMicro-HouseCallTROJ_GEN.R002C0OF421
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.6411870.susgen
FortinetRiskware/uTorrent.E6A1
DeepInstinctMALICIOUS
CrowdStrikewin/grayware_confidence_100% (D)

How to remove Malware.AI.402571378?

Malware.AI.402571378 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment