Malware

How to remove “Midie.105379 (B)”?

Malware Removal

The Midie.105379 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Midie.105379 (B) virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Macedonian
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the RedLine malware family
  • Anomalous binary characteristics

How to determine Midie.105379 (B)?


File Info:

name: 946BBBEA9114EB1B869E.mlw
path: /opt/CAPEv2/storage/binaries/1e1e540ba863de7c47b569da6d63b12b6f000b5b95e6ea25d1c6d8957a5e20c0
crc32: 3976788F
md5: 946bbbea9114eb1b869eb940e70a7f43
sha1: 4e27389e54ab188f013aca4b8213858e8ce1ed02
sha256: 1e1e540ba863de7c47b569da6d63b12b6f000b5b95e6ea25d1c6d8957a5e20c0
sha512: 4aac9834c5998e36a531797dc178a5b8cefd34960425638660f17dc7fad0da4e1f851b2156f23c28f6ce3b91cbcc8036adbcce863de24e3c5a87dab7ba6a5e60
ssdeep: 6144:YmIRPVhufcZfwUbjA5fPX8DVWg1bRLU6qsaHeDZmUUu8:YBPVAmJjJDVWgROFsaHeDoUU9
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T17D84DF1232C0C032D09325718A26CBB59EBEB4755626699FBFD81BBC5F247D2A73530E
sha3_384: 48ef636a61e7899eddf0cdbad2b821d05ccef04b87d9789964b7fa3b9bb7dedaaa5d1a4abf0c2af4cf0eea3c77ce615e
ep_bytes: e8b5660000e978feffffcccccccccccc
timestamp: 2020-12-11 15:01:12

Version Info:

FileVers: 65.51.36.16
ProductVersa: 7.50.25.71
InternalName: peatemas
LegalCopyrighd: sharnir
Translations: 0x0169 0x0300

Midie.105379 (B) also known as:

BkavW32.AIDetect.malware2
Elasticmalicious (high confidence)
DrWebTrojan.PWS.StealerNET.113
MicroWorld-eScanGen:Variant.Midie.105379
FireEyeGeneric.mg.946bbbea9114eb1b
McAfeePacked-GBE!946BBBEA9114
CylanceUnsafe
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0058b7b21 )
K7GWTrojan ( 0058b7b21 )
BitDefenderThetaGen:NN.ZexaF.34084.xq1@aiNdP3mG
CyrenW32/Kryptik.FXB.gen!Eldorado
SymantecPacked.Generic.620
ESET-NOD32a variant of Win32/Kryptik.HNOU
CynetMalicious (score: 100)
KasperskyHEUR:Trojan-Spy.Win32.Stealer.gen
BitDefenderGen:Variant.Midie.105379
AvastWin32:DropperX-gen [Drp]
RisingTrojan.Kryptik!1.DAF8 (CLASSIC)
Ad-AwareGen:Variant.Midie.105379
SophosMal/Generic-R + Troj/Krypt-BO
McAfee-GW-EditionPacked-GBE!946BBBEA9114
EmsisoftGen:Variant.Midie.105379 (B)
IkarusTrojan.Win32.Crypt
GDataWin32.Trojan-Stealer.Redline.T02BS9
AviraTR/AD.GenSHCode.kykra
MicrosoftTrojan:Win32/Azorult.RM!MTB
AhnLab-V3CoinMiner/Win.Glupteba.R456691
Acronissuspicious
VBA32Trojan.Agent
ALYacGen:Variant.Midie.105379
MAXmalware (ai score=88)
MalwarebytesTrojan.MalPack.GS
APEXMalicious
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.HNOL!tr
AVGWin32:DropperX-gen [Drp]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_70% (W)

How to remove Midie.105379 (B)?

Midie.105379 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment