Rootkit

Rootkit.Win32.Agent.emte (file analysis)

Malware Removal

The Rootkit.Win32.Agent.emte is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Rootkit.Win32.Agent.emte virus can do?

  • Performs HTTP requests potentially not found in PCAP.
  • Drops a binary and executes it
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Attempts to modify proxy settings
  • Attempts to interact with an Alternate Data Stream (ADS)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Rootkit.Win32.Agent.emte?


File Info:

name: FB0C356756EF7714A4F9.mlw
path: /opt/CAPEv2/storage/binaries/bfeaa7f6b62b41ce462bcb8d0ec8f2a4f1ddcc029b4f9836af9c7e6248db647c
crc32: 06960AEE
md5: fb0c356756ef7714a4f96e5fc20fcd30
sha1: a4bf23d601b92369487df6d836611d8f636b8caf
sha256: bfeaa7f6b62b41ce462bcb8d0ec8f2a4f1ddcc029b4f9836af9c7e6248db647c
sha512: c65970fa5d782338c7d808e2645b2a67095d42d6ece3536db10c2b02bc8358afb6fd8eb8e5b15571f482d3f81faa058fe2ba4ae05701925d621c06975973b86d
ssdeep: 49152:zqwCjkrmFhH7cwd4CA2j3x5dUIeZbIJIJraelh:zYw2sCPjrdn+b7Jra
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T140A5330FB57584D9FD866CFB180B96DA235968965C01F49E4E42CBD71CFAAE0A402F33
sha3_384: 8224df73cdcc2d3bd8bbe88b2accb3c590a4ab402eb73fa724a019d5241e405332c18dd57a94158f23daa6bf0fa18e9a
ep_bytes: 60be00d061008dbe0040deff5783cdff
timestamp: 2014-04-04 13:12:49

Version Info:

FileVersion: 2.1.0.3
FileDescription: 易语言程序
ProductName: 盒子助手
ProductVersion: 2.1.0.3
CompanyName: 舒克
LegalCopyright: 舒克 版权所有
Comments: 本程序使用易语言编写(http://www.eyuyan.com)
Translation: 0x0804 0x04b0

Rootkit.Win32.Agent.emte also known as:

LionicTrojan.Win32.Agent.Y!c
tehtrisGeneric.Malware
ClamAVWin.Tool.Qqhack-9919543-0
FireEyeGeneric.mg.fb0c356756ef7714
CAT-QuickHealRootkit.Agent
MalwarebytesMalware.Heuristic.1003
ZillyaRootkit.Agent.Win32.49260
SangforRootkit.Win32.Agent.Vbzh
CrowdStrikewin/grayware_confidence_60% (D)
VirITTrojan.Win32.KillProc.BUPK
CyrenW32/Trojan.IRG.gen!Eldorado
Elasticmalicious (moderate confidence)
ESET-NOD32a variant of Win32/Packed.FlyStudio.AA potentially unwanted
APEXMalicious
CynetMalicious (score: 100)
KasperskyRootkit.Win32.Agent.emte
NANO-AntivirusTrojan.Win32.KillProc.dlyzpo
AvastWin32:Malware-gen
TencentWin32.Rootkit.Agent.Ssmw
SophosGeneric Reputation PUA (PUA)
DrWebTrojan.KillProc.31496
McAfee-GW-EditionBehavesLike.Win32.Backdoor.tc
Trapminemalicious.high.ml.score
SentinelOneStatic AI – Malicious PE
GDataWin32.Trojan.PSE.QP57SD
Antiy-AVLTrojan/Win32.FlyStudio.a
XcitiumMalware@#215s8xd2verbb
ZoneAlarmRootkit.Win32.Agent.emte
MicrosoftPUA:Win32/Presenoker
GoogleDetected
McAfeeArtemis!FB0C356756EF
VBA32BScope.Trojan.Casur
Cylanceunsafe
TrendMicro-HouseCallTROJ_GEN.R002H0CEG23
RisingMalware.Undefined!8.C (TFE:5:ZBfp8Pr2xM)
MaxSecureDropper.Dinwod.frindll
FortinetW32/CoinMiner.PHP!tr
AVGWin32:Malware-gen
Cybereasonmalicious.601b92
DeepInstinctMALICIOUS

How to remove Rootkit.Win32.Agent.emte?

Rootkit.Win32.Agent.emte removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment