Rootkit

Rootkit.Win32.Plite.pfa removal guide

Malware Removal

The Rootkit.Win32.Plite.pfa is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Rootkit.Win32.Plite.pfa virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Korean
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Rootkit.Win32.Plite.pfa?


File Info:

name: B19855D67E1D9663069A.mlw
path: /opt/CAPEv2/storage/binaries/f2a782b1b5167d9a9c5cc626ab52825ff600759abf984bb47cb259d3e11804e3
crc32: AA6A8D51
md5: b19855d67e1d9663069a89862190d20c
sha1: 7392150c035aabcc8d806d4265c6138d8c587f19
sha256: f2a782b1b5167d9a9c5cc626ab52825ff600759abf984bb47cb259d3e11804e3
sha512: b868be9312a94d7fa5275817ec4fa14c01e6af532fb183c5ad90c50f528993a685de0c969b2764691ee800cb4fffd4480718185f9de4ddbdc96a883718a3e18c
ssdeep: 12288:h6Qyv5+vt/2z9olD6669/M+l6nRSciC1qfyI2stDzZ6JvEl+UgKsXBeGdnbH:hO5+v4olDK9/M/PhqV2+Z6JvJVKYeGdr
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T171E4220592400429F3A98BB15E58F9908609DDFE89E1F21FE8BD3D782D39053957BACF
sha3_384: cf0c3e7b9a5f432ff96eedb7221668602bbbd61676f709825118bf6e09d9597b9e35a531d50806a0633313236949cf1b
ep_bytes: b85cd34b005064ff3500000000648925
timestamp: 2012-10-19 05:46:29

Version Info:

CompanyName: ASPack
FileDescription: Asp Packer
FileVersion: 1, 0, 0, 85
InternalName: Security
LegalCopyright: Copyright (C) 2012
OriginalFilename: AspUp.exe
ProductName: Exe Packing Security
ProductVersion: 1, 0, 0, 85
Translation: 0x0412 0x04b0

Rootkit.Win32.Plite.pfa also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Heur.Mint.SP.Urelas.1
FireEyeGeneric.mg.b19855d67e1d9663
CAT-QuickHealTrojan.Gupboot.B.mue
CylanceUnsafe
ZillyaTrojan.Urelas.Win32.96
SangforSuspicious.Win32.Save.a
K7AntiVirusSpyware ( 00588d7d1 )
K7GWSpyware ( 00588d7d1 )
Cybereasonmalicious.67e1d9
BaiduWin32.Rootkit.Agent.s
VirITBackdoor.Win32.Generic.BFPP
CyrenW32/Gupboot.A.gen!Eldorado
SymantecSMG.Heur!gen
ESET-NOD32a variant of Win32/Urelas.AR
APEXMalicious
ClamAVWin.Ransomware.Generic-9773073-0
KasperskyRootkit.Win32.Plite.pfa
BitDefenderGen:Heur.Mint.SP.Urelas.1
NANO-AntivirusTrojan.Win32.AVKill.bdepgw
SUPERAntiSpywareTrojan.Agent/Gen-KillAV
AvastMBR:Plite-D [Rtk]
Tencentrootkit.win32.plite.a
Ad-AwareGen:Heur.Mint.SP.Urelas.1
SophosML/PE-A + Troj/Gupboot-A
ComodoTrojWare.Win32.Small.NAF@531prv
DrWebTrojan.AVKill.24205
VIPRETrojan.Win32.Urelas.b (v)
TrendMicroTROJ_URELAS.SMB
McAfee-GW-EditionObfuscated-FAF!hb
EmsisoftGen:Heur.Mint.SP.Urelas.1 (B)
IkarusWin32.KillAV
GDataGen:Heur.Mint.SP.Urelas.1
JiangminRootkit.Plite.a
AviraTR/Graftor.884956
Antiy-AVLTrojan/Generic.ASMalwS.33838F
ArcabitTrojan.Mint.SP.Urelas.1
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.PbBot.R41993
Acronissuspicious
McAfeeObfuscated-FAF!hb
MAXmalware (ai score=87)
VBA32BScope.Trojan.AVKill
MalwarebytesMalware.AI.768648326
TrendMicro-HouseCallTROJ_URELAS.SMB
RisingTrojan.Agent!1.9CB5 (RDMK:cmRtazrL7rbeJQc94LSKMe9jdjee)
YandexTrojan.Urelas!b0u+ZO891bY
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_96%
FortinetPossibleThreat
BitDefenderThetaGen:NN.ZexaF.34114.Pm3faGaydGmO
AVGMBR:Plite-D [Rtk]
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_80% (D)
MaxSecureTrojan.Malware.300983.susgen

How to remove Rootkit.Win32.Plite.pfa?

Rootkit.Win32.Plite.pfa removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment