Malware

Troj/Scar-BZ (file analysis)

Malware Removal

The Troj/Scar-BZ is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Troj/Scar-BZ virus can do?

  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Troj/Scar-BZ?


File Info:

name: 0FFB75D0C6FA1CC7629D.mlw
path: /opt/CAPEv2/storage/binaries/1ea45c42ec4d180c72619110ee04f584e41a465df8bb5de1bc7b2855467568df
crc32: 261D61AB
md5: 0ffb75d0c6fa1cc7629ddc0f2fe20e23
sha1: d6bc305d31ec2cb18a0f0ef02a4e57446e41a9b3
sha256: 1ea45c42ec4d180c72619110ee04f584e41a465df8bb5de1bc7b2855467568df
sha512: cb9ac1a29e34ac40f7c9b12303bd1ae0e117dcb1df679031bfcf891a2378cc4533027f09d5ab34facbf72941ea8b1935b4bc603ee610aa7486d4dd124cd0ad69
ssdeep: 6144:C6M96wgvRHCzOYtqlGyzcsX3KA0LQIQR:Xi3gNCpOdn/u
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C714010D6E934127D9849AB0C1D04FD90BFCAC433D9275AFFFA09816296409DA5F89FE
sha3_384: 999b783825f418d4fd862e027ac9d345b456e12ceb2d320d60a9c5bb671356a69d902afc7b519ea3a14cc36076665ca5
ep_bytes: 558bec6aff68b060400068503c400064
timestamp: 2012-01-21 11:43:07

Version Info:

0: [No Data]

Troj/Scar-BZ also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Dialer.lvSo
CynetMalicious (score: 100)
FireEyeGeneric.mg.0ffb75d0c6fa1cc7
CAT-QuickHealTrojan.Aksula.A
ALYacTrojan.GenericKDZ.41799
Cylanceunsafe
SangforTrojan.Win32.Save.a
AlibabaBackdoor:Win32/Farfli.626658d0
Cybereasonmalicious.0c6fa1
ArcabitTrojan.Generic.DA347
BitDefenderThetaAI:Packer.D74E769920
VirITTrojan.Win32.Dialer.AHYB
CyrenW32/Zegost.MYEI-4034
SymantecBackdoor.Trojan
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Farfli_AGen.AB
APEXMalicious
ClamAVWin.Malware.Generickdz-6957625-0
KasperskyHEUR:Trojan.Win32.Farfli.gen
BitDefenderTrojan.GenericKDZ.41799
NANO-AntivirusTrojan.Win32.Scar.bcbyug
SUPERAntiSpywareTrojan.Agent/Gen-Zegost
MicroWorld-eScanTrojan.GenericKDZ.41799
AvastWin32:Dropper-JQQ [Drp]
RisingTrojan.Win32.Lebag.b (CLASSIC)
TACHYONTrojan/W32.Agent.200704.AVB
EmsisoftTrojan.GenericKDZ.41799 (B)
BaiduWin32.Trojan.Dialer.d
F-SecureBackdoor.BDS/Zegost.birna
DrWebTrojan.SpyBot.324
VIPRETrojan.GenericKDZ.41799
TrendMicroBKDR_ZEGOST.SM16
McAfee-GW-EditionBehavesLike.Win32.Generic.cc
Trapminemalicious.high.ml.score
SophosTroj/Scar-BZ
IkarusTrojan.Win32.Spy
JiangminTrojan/Scar.auvs
AviraBDS/Zegost.birna
Antiy-AVLTrojan/Win32.Dialer.ansz
XcitiumTrojWare.Win32.Agent.PDSB@4q3i1w
MicrosoftBackdoor:Win32/Farfli.FT!MTB
ViRobotTrojan.Win.Z.Agent.200704.CWN
ZoneAlarmHEUR:Trojan.Win32.Farfli.gen
GDataTrojan.GenericKDZ.41799
GoogleDetected
AhnLab-V3Trojan/Win32.Dialer.R21388
McAfeeBackDoor-EMA.gen.e
MAXmalware (ai score=82)
VBA32Trojan.Farfli
MalwarebytesMalware.AI.2084250538
PandaGeneric Malware
ZonerTrojan.Win32.22067
TrendMicro-HouseCallBKDR_ZEGOST.SM16
TencentTrojan.Win32.Lebag.b
YandexTrojan.GenAsa!pd90PKR7MRk
SentinelOneStatic AI – Suspicious PE
FortinetW32/Wacatac.B!tr
AVGWin32:Dropper-JQQ [Drp]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Troj/Scar-BZ?

Troj/Scar-BZ removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment