Rootkit

Rootkit.Win32.Plite.pvd removal tips

Malware Removal

The Rootkit.Win32.Plite.pvd is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Rootkit.Win32.Plite.pvd virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Attempts to connect to a dead IP:Port (2 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Possible date expiration check, exits too soon after checking local time
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • Unconventionial language used in binary resources: Korean
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Executable file is packed/obfuscated with MPRESS
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Anomalous binary characteristics

How to determine Rootkit.Win32.Plite.pvd?


File Info:

name: C9765DD9E59612CAF5D6.mlw
path: /opt/CAPEv2/storage/binaries/3b780d394ffb7427135436ec5401edfdb1cf242773e513dec0fb4e146c98a601
crc32: 14B0DA4C
md5: c9765dd9e59612caf5d6a7a695148312
sha1: 594eb5979f4a929a663cd83944e87f6f27207839
sha256: 3b780d394ffb7427135436ec5401edfdb1cf242773e513dec0fb4e146c98a601
sha512: 4ad4ee6a170f8ecf3a44955194bbd8efc9d2b32cb7bbf121c5ea1dad48b6edf12980b6b3282ada23c8eb7ead5074fc1855fc97f907ae2dace5e49ddc8239858c
ssdeep: 24576:wlvjco24PDcHYByYE2HeobxrCmby6sKrIy:ac147c4BY2HVxlby
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16C85F015BA80D0B5F36807711416E6F50EB5BC3942A8D58FF7687E3A5A312C38A7728F
sha3_384: d25520dd9e0eada3495fec0cbe05c406faa656b4c40bd6289acce94494bb6aca85d47ed7a7d019cbd7350404e5527421
ep_bytes: e850750000e979feffff8bff558bec81
timestamp: 2012-11-06 10:57:03

Version Info:

CompanyName: Samsung Urban
FileDescription: Ultead Video
FileVersion: 1, 0, 0, 85
InternalName: Jghdfsfd Porker
LegalCopyright: Copyright (C) 2012
OriginalFilename: Maggo Play
ProductName: Gtsfwe
ProductVersion: 1, 0, 0, 85
Translation: 0x0412 0x04b0

Rootkit.Win32.Plite.pvd also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.47429798
FireEyeGeneric.mg.c9765dd9e59612ca
CAT-QuickHealTrojan.Gupboot.B.mue
ALYacTrojan.GenericKD.47429798
CylanceUnsafe
ZillyaTrojan.Urelas.Win32.469
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 004996b71 )
K7GWTrojan ( 004996b71 )
CrowdStrikewin/malicious_confidence_70% (D)
BaiduWin32.Rootkit.Agent.s
CyrenW32/Plite.C.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Urelas.AR
APEXMalicious
ClamAVWin.Trojan.R-102
KasperskyRootkit.Win32.Plite.pvd
BitDefenderTrojan.GenericKD.47429798
NANO-AntivirusTrojan.Win32.AVKill.cqueaz
SUPERAntiSpywareTrojan.Agent/Gen-Dropper
AvastMBR:Plite-G [Rtk]
TencentMalware.Win32.Gencirc.10cdf58a
Ad-AwareTrojan.GenericKD.47429798
SophosML/PE-A + Troj/Backdr-IJ
ComodoTrojWare.Win32.GupBoot.BFC@5szi8p
DrWebTrojan.AVKill.24829
VIPRETrojan.Win32.Urelas.b (v)
McAfee-GW-EditionBehavesLike.Win32.CoinMiner.tt
EmsisoftTrojan.GenericKD.47429798 (B)
IkarusHoax.Win32.ArchSMS
GDataWin32.Trojan.PSE.1EZZ25Y
JiangminTrojan/Generic.aouac
AviraTR/Crypt.XPACK.Gen2
Antiy-AVLTrojan/Generic.ASMalwS.2B8365
MicrosoftTrojan:Win32/Gupboot.B
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Wecod.R41369
Acronissuspicious
McAfeeGeneric BackDoor.aeu
MAXmalware (ai score=86)
VBA32Rootkit.Plite
MalwarebytesMalware.AI.986681238
RisingTrojan.Agent!1.9D23 (CLASSIC)
YandexTrojan.GenAsa!D/Teqrj3e+4
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_99%
FortinetW32/Urelas.O!tr
BitDefenderThetaGen:NN.ZexaF.34062.Vn3@a4Q8eRfO
AVGMBR:Plite-G [Rtk]
Cybereasonmalicious.9e5961
PandaTrj/Genetic.gen
MaxSecureTrojan.Malware.121218.susgen

How to remove Rootkit.Win32.Plite.pvd?

Rootkit.Win32.Plite.pvd removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment