Malware

About “Tedy.137414” infection

Malware Removal

The Tedy.137414 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Tedy.137414 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Attempts to modify desktop wallpaper
  • Behavioural detection: Injection (inter-process)
  • Created a process from a suspicious location
  • CAPE detected the Formbook malware family
  • Connects to/from or queries a remote desktop session
  • Uses suspicious command line tools or Windows utilities

How to determine Tedy.137414?


File Info:

name: 4D993E4680811DFB4BAA.mlw
path: /opt/CAPEv2/storage/binaries/a9c251b7cade00ac9cd789ffdd71da6dc6bf13620fef6bcd005f619441e41d67
crc32: BBFFA25C
md5: 4d993e4680811dfb4baad876e806c70e
sha1: ab72438cfe558ed7dba65c88c20ce05e186baaa4
sha256: a9c251b7cade00ac9cd789ffdd71da6dc6bf13620fef6bcd005f619441e41d67
sha512: aa59de20c0018bbf0719f2ac22c46d84b0e7fd03852acf6d19c91c17f8d33ad325b98e2581d23af61d5891499ac33ae15cf5712b4cc140b7690ee8ce6ac479be
ssdeep: 3072:F14/IIhEDnmJ+Yn74iIOR/rfLIK72hr/TUWw5Zgm6OMv7aZ2jnP9zGhfS+FhJoqz:FbCs0DLt5Wk+62LJGhfhhJo1FjbuLYI
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T12E24121AB0C18A77D6D758320527D62DFBBA85035291F30B0B702E7E2B72987CD5D2A3
sha3_384: 0b572fbe44c9e0a3f165411f3b3be7ee2b47e4a25a318316ecec93ae26747261d784b0ad678f2945a7c004eabbcf0437
ep_bytes: 81ec8001000053555633db57895c2418
timestamp: 2007-06-08 21:48:42

Version Info:

Comments: project
CompanyName: Clarify
FileDescription: admission
FileVersion: 1.2.3
LegalCopyright: thirsty
LegalTrademarks: clash
ProductName: comedy
Translation: 0x0000 0x04e4

Tedy.137414 also known as:

MicroWorld-eScanGen:Variant.Tedy.137414
FireEyeGen:Variant.Tedy.137414
ALYacTrojan.NSISX.Spy.Gen.2
BitDefenderThetaGen:NN.ZexaF.34712.aiW@a4sxbpj
CyrenW32/Ninjector.BF.gen!Eldorado
Elasticmalicious (moderate confidence)
ESET-NOD32a variant of Win32/Injector.ERTP
Paloaltogeneric.ml
KasperskyUDS:Trojan.Win32.Injexa.gen
BitDefenderGen:Variant.Tedy.137414
AvastFileRepMalware [Pws]
Ad-AwareGen:Variant.Tedy.137414
F-SecureTrojan.TR/Crypt.XPACK.Gen
McAfee-GW-EditionBehavesLike.Win32.Generic.dc
EmsisoftGen:Variant.Tedy.137414 (B)
IkarusWin32.Outbreak
GDataGen:Variant.Tedy.137414
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=80)
ArcabitTrojan.Tedy.D218C6
ZoneAlarmUDS:Trojan.Win32.Injexa.gen
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
CynetMalicious (score: 100)
AhnLab-V3Infostealer/Win.Formbook.R496665
MalwarebytesTrojan.Dropper.NSIS
APEXMalicious
RisingTrojan.Generic@AI.94 (RDML:QAB8iQb+ccVFQOoPVbHRGw)
SentinelOneStatic AI – Malicious PE
FortinetW32/Agent.CQY!tr
AVGFileRepMalware [Pws]

How to remove Tedy.137414?

Tedy.137414 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment