Malware

Should I remove “Troj/Agent-BCLJ”?

Malware Removal

The Troj/Agent-BCLJ is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Troj/Agent-BCLJ virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • Executable file is packed/obfuscated with MPRESS
  • Authenticode signature is invalid
  • Anomalous binary characteristics
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Troj/Agent-BCLJ?


File Info:

name: 084A1944DF863682C530.mlw
path: /opt/CAPEv2/storage/binaries/cabfab1ac96b76a7d2bf42ba08a67cc8f7820876de702aafc1b4d2ab286f5cc3
crc32: A96B6200
md5: 084a1944df863682c53039ddc6328519
sha1: 14ca4ae319cb6225005ef50cc6e484a73ad6505f
sha256: cabfab1ac96b76a7d2bf42ba08a67cc8f7820876de702aafc1b4d2ab286f5cc3
sha512: 2c5c799ffe8a9c6ac67c31280c3e0754f6e792ea36744fe99020724f0daf4a518d7125b7999ebb0b05840c25eab7478e19d678d3e387db4f4e69a3494a32c707
ssdeep: 768:0l/N3MUHB2XtusbADxjpozp1XgH8aAWBftQz9PClbtp7hsAmKx:0pNcUq7bAizgH8qBFCaZeW
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1E5637B38AAD615F2E37789F58DF771F6B9227032FC029E0C48C663510913B569CB9A1E
sha3_384: 5121bec834dc5578850eb90b04a15a5e4f13316af36b29f5a2048bf2d5c532fb8c9136e396f0fef4594419cfdd3e9824
ep_bytes: 6a00e8950b0000a320314000e8850b00
timestamp: 2014-05-19 11:25:38

Version Info:

0: [No Data]

Troj/Agent-BCLJ also known as:

BkavW32.AIDetectNet.01
tehtrisGeneric.Malware
DrWebTrojan.DownLoad3.33216
MicroWorld-eScanGen:Variant.Daytre.30
ClamAVWin.Downloader.Upatre-5744087-0
McAfeeGenericR-PDT!084A1944DF86
MalwarebytesTrojan.Email.FakeDoc
ZillyaTrojan.Generic.Win32.685192
SangforSuspicious.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
K7GWTrojan ( 0052964f1 )
K7AntiVirusTrojan ( 0052964f1 )
VirITTrojan.Win32.Upatre.AT
CyrenW32/Upatre.IM.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32Win32/TrojanDownloader.Waski.E
ZonerTrojan.Win32.23633
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Daytre.30
NANO-AntivirusTrojan.Win32.Zbot.cykpux
AvastWin32:FakeMail-N [Trj]
TencentTrojan-DL.Win32.Waski.zd
EmsisoftGen:Variant.Daytre.30 (B)
F-SecureTrojan.TR/Dropper.Gen
BaiduWin32.Trojan-Downloader.Waski.a
VIPREGen:Variant.Daytre.30
McAfee-GW-EditionBehavesLike.Win32.Generic.lt
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.084a1944df863682
SophosTroj/Agent-BCLJ
SentinelOneStatic AI – Malicious PE
GDataWin32.Trojan-Downloader.Upatre.BJ
JiangminTrojanSpy.Zbot.eehr
AviraTR/Dropper.Gen
Antiy-AVLVirus/Win32.Expiro.imp
XcitiumTrojWare.Win32.Monder.gen@1gs5jk
ArcabitTrojan.Daytre.30
ViRobotTrojan.Win32.Upatre.25916
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftTrojan:Win32/Waski.E!MTB
GoogleDetected
AhnLab-V3Trojan/Win32.Upatre.R288209
VBA32TrojanSpy.Zbot
MAXmalware (ai score=82)
Cylanceunsafe
PandaTrj/Zbot.U
RisingTrojan.DL.Win32.Upatre.aaa (CLASSIC)
YandexTrojan.GenAsa!/2SMjwyI0zs
IkarusTrojan-Spy.Agent
MaxSecureTrojan.Upatre.Gen
FortinetW32/Waski.E!tr
AVGWin32:FakeMail-N [Trj]
DeepInstinctMALICIOUS

How to remove Troj/Agent-BCLJ?

Troj/Agent-BCLJ removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment