Rootkit

Should I remove “Rootkit.Win32.Plite.pfl”?

Malware Removal

The Rootkit.Win32.Plite.pfl is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Rootkit.Win32.Plite.pfl virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Attempts to connect to a dead IP:Port (4 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Korean
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Anomalous binary characteristics

How to determine Rootkit.Win32.Plite.pfl?


File Info:

name: C47CEA9441E60251908B.mlw
path: /opt/CAPEv2/storage/binaries/48291319bd1b224b9eda39a8ede8f4afcf59fc8ce9d04e2ea6f952966b88cbdc
crc32: 665C1A63
md5: c47cea9441e60251908bec1432d2c8ae
sha1: 752a6fbdfa2585dfb4802923341fd5dc835f1339
sha256: 48291319bd1b224b9eda39a8ede8f4afcf59fc8ce9d04e2ea6f952966b88cbdc
sha512: aa5b1e93c8072d306db586896f742a15dfb9e04caa880896cb3f72a62c5cbff99bd6c9dad764ddbd61d14fd9933b8b5e6d55020aca205f947d41930706e983a2
ssdeep: 6144:bS5XDCmayv02xs7PCt43A7qFqYeAbU9CIxxqbFG9hTRzBSAyiwi/BEku0R72Wqgc:sZmC63nFNerrbqg/N0Di/U0lqgZLoP
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T17194AD478A955021DF4C77306182E2AE3C65AC7B1DACE69EEA58BD39C47D0C3127B12F
sha3_384: 690fda16d7c83bc23711ea1496b91ebcbe5e16157c00a065c812b485566583b46bdf2e62c85113b0ed2ea31225bd5e31
ep_bytes: b85cac46005064ff3500000000648925
timestamp: 2013-09-01 11:35:33

Version Info:

0: [No Data]

Rootkit.Win32.Plite.pfl also known as:

BkavW32.FamVT.PliteEETTc.Trojan
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Heur.Mint.SP.Urelas.1
FireEyeGeneric.mg.c47cea9441e60251
CAT-QuickHealTrojan.Gupboot.G.mue
CylanceUnsafe
VIPRETrojan.Win32.Urelas.ab (v)
SangforSuspicious.Win32.Save.a
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderGen:Heur.Mint.SP.Urelas.1
K7GWRiskware ( 0040eff71 )
Cybereasonmalicious.441e60
BaiduWin32.Trojan.Urelas.a
VirITTrojan.Win32.AVKill.BWVY
CyrenW32/Hupigon.BS.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Urelas.S
APEXMalicious
ClamAVWin.Trojan.9525802-1
KasperskyRootkit.Win32.Plite.pfl
NANO-AntivirusTrojan.Win32.cfrknz.eaqesx
RisingRootkit.Plite!8.BC7 (RDMK:cmRtazrgpA1W7kCSGSqXnXqekMce)
EmsisoftGen:Heur.Mint.SP.Urelas.1 (B)
ComodoTrojWare.Win32.Small.NAF@531prv
DrWebTrojan.AVKill.33018
ZillyaRootkit.Plite.Win32.3
McAfee-GW-EditionBehavesLike.Win32.Corrupt.gc
SophosML/PE-A + Troj/Urelas-AA
SentinelOneStatic AI – Malicious PE
JiangminRootkit.Plite.c
AviraBDS/Backdoor.Gen7
Antiy-AVLTrojan/Generic.ASMalwS.3EF5B2
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
GDataGen:Heur.Mint.SP.Urelas.1
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Urelas.R81298
McAfeeObfuscated-FVT!hb
MAXmalware (ai score=83)
VBA32BScope.Trojan.AVKill
MalwarebytesMalware.AI.206448206
PandaTrj/Genetic.gen
TencentTrojan.Win32.Urelas.16000132
YandexTrojan.GenAsa!/wt/nlzXvmo
IkarusTrojan.Win32.Gupboot
FortinetW32/Urelas.O!tr
BitDefenderThetaAI:Packer.B185F18D1F
AVGWin32:Dropper-NCI [Drp]
AvastWin32:Dropper-NCI [Drp]
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Rootkit.Win32.Plite.pfl?

Rootkit.Win32.Plite.pfl removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment