Malware

Malware.AI.4062942941 information

Malware Removal

The Malware.AI.4062942941 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Malware.AI.4062942941 virus can do?

  • Attempts to connect to a dead IP:Port (1 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Created a process from a suspicious location
  • Steals private information from local Internet browsers
  • Collects and encrypts information about the computer likely to send to C2 server
  • Spoofs its process name and/or associated pathname to appear as a legitimate process
  • CAPE detected the Loki malware family
  • Creates a copy of itself
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Collects information to fingerprint the system

Related domains:

wpad.local-net

How to determine Malware.AI.4062942941?


File Info:

name: 476AD4347DB56F5CDFAA.mlw
path: /opt/CAPEv2/storage/binaries/336c3a854ec4c9d0c5c6c40f65de24ba6f563414e88d358cde5c76961ea2e3e8
crc32: 2DD9CB90
md5: 476ad4347db56f5cdfaa3323d73554f6
sha1: c525d69b4f4ddf35c54849e67783d6bab2522591
sha256: 336c3a854ec4c9d0c5c6c40f65de24ba6f563414e88d358cde5c76961ea2e3e8
sha512: 2a456cbac58c6bb2c48c132396645f0ea9a02a01db9289aad3ec6d67d1d6f7f32822e9ba10fc068e147f4be0e926d16e6bf36a04d4aa98b3f36645f95235c875
ssdeep: 6144:rGiUkvLF8xSSfRrZHHrxLKObDfkwGN/2NSjOf8OLlms66WCMVQO00AJUmcwEKTKe:fvL0VHVKObDfqN/Fy8eAB6EQO8JLcwPN
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1EE54234E24E02E67EA140571E77B13F1FBF9200946664FA74BD8ACD758427C3A81DAF2
sha3_384: 9c1a7e325ccc2e26454908856ff31cb6c2aaac122183b59b01ff319c120833e8170f0beb965d93d738cfec524d44ab88
ep_bytes: 81ec8001000053555633db57895c2418
timestamp: 2008-10-10 21:49:01

Version Info:

0: [No Data]

Malware.AI.4062942941 also known as:

BkavW32.AIDetect.malware2
DrWebTrojan.PWS.Stealer.18836
MicroWorld-eScanTrojan.GenericKD.47492083
FireEyeTrojan.GenericKD.47492083
McAfeeRDN/Generic.dx
SangforSuspicious.Win32.Save.a
Cybereasonmalicious.47db56
CyrenW32/Injector.AQS.gen!Eldorado
SymantecPacked.Generic.606
ESET-NOD32a variant of Win32/Injector.EQPW
KasperskyHEUR:Backdoor.Win32.Androm.gen
BitDefenderTrojan.GenericKD.47492083
AvastWin32:Trojan-gen
Ad-AwareTrojan.GenericKD.47492083
EmsisoftTrojan.GenericKD.47492083 (B)
IkarusTrojan.Win32.Injector
AviraTR/Dropper.Gen
MAXmalware (ai score=82)
KingsoftWin32.Hack.Undef.(kcloud)
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
GDataTrojan.GenericKD.47492083
CynetMalicious (score: 100)
VBA32Trojan.Script.Phonzy
ALYacTrojan.GenericKD.47492083
MalwarebytesMalware.AI.4062942941
APEXMalicious
SentinelOneStatic AI – Suspicious PE
FortinetW32/Injector.EQPP!tr
AVGWin32:Trojan-gen

How to remove Malware.AI.4062942941?

Malware.AI.4062942941 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment