Malware

Troj/Delph-CC removal instruction

Malware Removal

The Troj/Delph-CC is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Troj/Delph-CC virus can do?

  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Troj/Delph-CC?


File Info:

name: BB96388897FB7FF78BA6.mlw
path: /opt/CAPEv2/storage/binaries/c5ec3f36121ad2589543d961339d311a6d72f8786adedb78676d1e52c6550098
crc32: 28FF36CA
md5: bb96388897fb7ff78ba6d6eb64c3f529
sha1: fb474abd364cdf09ab92bef1e5008b217f2306c0
sha256: c5ec3f36121ad2589543d961339d311a6d72f8786adedb78676d1e52c6550098
sha512: aea89ec44a9fb57c30e6f8893fc5e617d86a49c428fc5447fe99cab46269f36fb2aa3325157518f64cb0e890dda6a8fe6b62fad0af9644b5c8b99908430f5ef1
ssdeep: 24576:rOj/QqMuearixn7Vgq45moYSFCy3dg2yuoKKW0pm:ZHuLrCnulRDoKKWt
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1CC259D167AD484B2E57341348DA7C567EEB1BC540B21869F23F8B35E1F336C1AA39722
sha3_384: f90b805c0f233ce96b571b3f2dfd8898af6acba4a66a00b7f1df2bd0b649fcc3dc9e9da9249b328605c4eae90fd1fbcc
ep_bytes: 558bec83c4f0b838464000e874e2ffff
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Troj/Delph-CC also known as:

BkavW32.AIDetectMalware
LionicVirus.Win32.Lamer.kYNN
MicroWorld-eScanTrojan.Agent.EICV
FireEyeGeneric.mg.bb96388897fb7ff7
CAT-QuickHealWorm.DelfPMF.S30896276
SkyhighBehavesLike.Win32.CoinMiner.dm
McAfeeW32/HLLP.11042.gen
MalwarebytesGeneric.Trojan.Delf.DDS
ZillyaWorm.Delf.Win32.3450
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 004bcce41 )
Alibabavirus:Win32/InfectPE.ali2000007
K7GWTrojan ( 004bcce41 )
Cybereasonmalicious.897fb7
BaiduWin32.Virus.Lamer.f
SymantecW32.SillyP2P
Elasticmalicious (moderate confidence)
ESET-NOD32Win32/Delf.NAY
APEXMalicious
TrendMicro-HouseCallTROJ_AGENT_005911.TOMB
ClamAVWin.Malware.Delf-6737076-0
KasperskyP2P-Worm.Win32.Delf.aj
BitDefenderTrojan.Agent.EICV
NANO-AntivirusTrojan.Win32.Delf.oxkq
AvastWin32:Delf-SVI [Trj]
TencentVirus.Win32.Lamer.fh
EmsisoftTrojan.Agent.EICV (B)
F-SecureTrojan.TR/Dropper.Gen
DrWebWin32.HLLW.Kazaa.924
VIPRETrojan.Agent.EICV
TrendMicroTROJ_AGENT_005911.TOMB
Trapminemalicious.high.ml.score
SophosTroj/Delph-CC
SentinelOneStatic AI – Malicious PE
JiangminWorm/Delf.vm
GoogleDetected
AviraTR/Dropper.Gen
VaristW32/Aple.A.gen!Eldorado
Antiy-AVLVirus/Win32.BagarBubba.a
Kingsoftmalware.kb.b.1000
MicrosoftWorm:Win32/Xolxo.A
XcitiumTrojWare.Win32.Pincav.AV@2rw0ny
ArcabitTrojan.Agent.EICV
ZoneAlarmP2P-Worm.Win32.Delf.aj
GDataWin32.Trojan.PSE.5ZQRW6
CynetMalicious (score: 100)
AhnLab-V3Worm/Win32.Delf.R119214
Acronissuspicious
BitDefenderThetaGen:NN.ZelphiF.36802.9mZ@aWQAofp
ALYacTrojan.Agent.EICV
MAXmalware (ai score=84)
VBA32Worm.Delf
Cylanceunsafe
PandaTrj/Genetic.gen
RisingWorm.P2p.Win32.Delf.bn (CLASSIC)
IkarusTrojan.Agent
MaxSecureVirus.W32.Lamer.FG
FortinetW32/Aple.A
AVGWin32:Delf-SVI [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)
alibabacloudVirus:Win/Bagar.A(dyn)

How to remove Troj/Delph-CC?

Troj/Delph-CC removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment