Trojan

Trojan.BAT.KillFiles removal tips

Malware Removal

The Trojan.BAT.KillFiles is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.BAT.KillFiles virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Attempts to modify proxy settings
  • Deletes executed files from disk
  • Touches a file containing cookies, possibly for information gathering

How to determine Trojan.BAT.KillFiles?


File Info:

name: 11F2673D46397F4434BC.mlw
path: /opt/CAPEv2/storage/binaries/a958eecfe1cedd31f03f853503dcac7859b8028eaad6b57202c4a5cb21e51cbe
crc32: 2B2FD950
md5: 11f2673d46397f4434bc494167329aa0
sha1: e798947b5893cc9f09e580c99b9928444cf5bab3
sha256: a958eecfe1cedd31f03f853503dcac7859b8028eaad6b57202c4a5cb21e51cbe
sha512: 66455d0b5f6f553a55deb83393a2238091d7a8ed699df327133ced4bf7692cea7b2503b9ae8596f3298ef690beabdffefc5ff34a8731f4694c1e5c7c8ae168ba
ssdeep: 1536:f7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfUwWO:T7DhdC6kzWypvaQ0FxyNTBfU
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T127936C41F3E142F7EAF2053100A6722F973663389724E8DBC75C2E529913AD5A63D3E9
sha3_384: 0971424de99c2878a444ba3bffdf4bd29362d49b44e6a0ce28de11465e9d6aaff686a2fef18cc86d462ca244ca5ae4a8
ep_bytes: 68ac00000068000000006868804100e8
timestamp: 2019-07-30 08:52:45

Version Info:

0: [No Data]

Trojan.BAT.KillFiles also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Generic.4!c
MicroWorld-eScanTrojan.GenericKD.70454199
FireEyeGeneric.mg.11f2673d46397f44
CAT-QuickHealTrojan.GenericPMF.S15043657
SkyhighBehavesLike.Win32.RealProtect.mh
ALYacTrojan.GenericKD.70454199
Cylanceunsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_70% (W)
K7GWRiskware ( 00584baa1 )
K7AntiVirusRiskware ( 00584baa1 )
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.BAT.Generic
BitDefenderTrojan.GenericKD.70454199
AvastWin32:Malware-gen
TencentTrojan.Win32.Redcap.hg
EmsisoftTrojan.GenericKD.70454199 (B)
F-SecureTrojan.TR/Injector.aycck
VIPRETrojan.GenericKD.70454199
SophosGeneric ML PUA (PUA)
SentinelOneStatic AI – Malicious PE
GDataTrojan.GenericKD.70454199
VaristW32/Kryptik.AYO.gen!Eldorado
AviraTR/Injector.aycck
ArcabitTrojan.Generic.D4330BB7
ZoneAlarmHEUR:Trojan.BAT.Generic
MicrosoftTrojan:Win32/Wacatac.B!ml
GoogleDetected
AhnLab-V3Trojan/Win.Generic.C5532760
McAfeeArtemis!11F2673D4639
MAXmalware (ai score=85)
VBA32Trojan.BAT.KillFiles
MalwarebytesTrojan.Crypt
TrendMicro-HouseCallTROJ_GEN.R002H0CK123
RisingTrojan.Generic@AI.100 (RDML:tAmlp2bXyICppmvbC4iy0Q)
IkarusTrojan.Win32.Occamy
MaxSecureTrojan.Malware.216064600.susgen
FortinetW32/Nitol.AB!tr
AVGWin32:Malware-gen
Cybereasonmalicious.b5893c
DeepInstinctMALICIOUS

How to remove Trojan.BAT.KillFiles?

Trojan.BAT.KillFiles removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment