Trojan

Should I remove “Trojan-Downloader.Win32.Gootkit.bpf”?

Malware Removal

The Trojan-Downloader.Win32.Gootkit.bpf is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Downloader.Win32.Gootkit.bpf virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Checks the CPU name from registry, possibly for anti-virtualization

How to determine Trojan-Downloader.Win32.Gootkit.bpf?


File Info:

name: 84A8797E3C59E5D8D9A7.mlw
path: /opt/CAPEv2/storage/binaries/3c7213259de6c43fb66d5d998b0e61c0e28889c9a92e2caded0b7960a0fcffc4
crc32: 32C6D7F8
md5: 84a8797e3c59e5d8d9a724f0c43f2968
sha1: 3bf0a58fba49ad8171cb5e7829f449111cc654a5
sha256: 3c7213259de6c43fb66d5d998b0e61c0e28889c9a92e2caded0b7960a0fcffc4
sha512: a018067cf80a034ae2061ce94394fcd2d51bb9b7e889acf0769a9ec45c00785a01a0b09ea9cbae7ed26e540f2a10627db1d508aa80c0abd0f408468077f9fe7c
ssdeep: 6144:2twdTM7jTRGXNWH8Y30Yu9vjUCtwCBAi4xQ8ZWpLfCK9cSXrN4pmGuvRz:2edTMHFGq8Y30YuJUqwCCRQ4WpCK9cSJ
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19564122869809033CA5220314235EAF1EEBD7A300B516BEF87D59D755F71DE3E1326AB
sha3_384: 41b71c4a79b24aa7823cf41ee4ab321c09143b02861008899e8a5971ff7b39b53f89409a8bd230bb9434b02134b36f6b
ep_bytes: 60be00b042008dbe0060fdff57eb0b90
timestamp: 2007-12-03 11:25:51

Version Info:

CompanyName: Bottle Rocket Apps Real
ProductVersion: 13.2.94.58
ProductName: Spellare
LegalCopyright: Copyright © 2004 Bottle Rocket Apps Real. All rights reserved.
FileDescription: Spellare
FileVersion: 13.2.94.58
InternalName: Spellare
Translation: 0x0409 0x04b0

Trojan-Downloader.Win32.Gootkit.bpf also known as:

BkavW32.AIDetect.malware2
MicroWorld-eScanTrojan.GenericKD.38136000
FireEyeGeneric.mg.84a8797e3c59e5d8
McAfeeArtemis!84A8797E3C59
CylanceUnsafe
K7AntiVirusTrojan ( 0051918e1 )
AlibabaTrojanDownloader:Win32/Gootkit.0845d28b
K7GWTrojan ( 0051918e1 )
Cybereasonmalicious.fba49a
ESET-NOD32a variant of Win32/Kryptik.GNPE
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan-Downloader.Win32.Gootkit.bpf
BitDefenderTrojan.GenericKD.38136000
NANO-AntivirusTrojan.Win32.Yakes.fkyurj
AvastFileRepMalware
Ad-AwareTrojan.GenericKD.38136000
SophosMal/Generic-S
ComodoPacked.Win32.MUPX.Gen@24tbus
DrWebTrojan.PWS.Banker1.34773
McAfee-GW-EditionBehavesLike.Win32.Trojan.fc
EmsisoftTrojan.GenericKD.38136000 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Yakes.abzx
AviraTR/Crypt.Agent.ppzla
MAXmalware (ai score=83)
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
GDataTrojan.GenericKD.38136000
CynetMalicious (score: 100)
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.34062.uqNfaysX0jfi
ALYacTrojan.GenericKD.38136000
VBA32Trojan.Yakes
TrendMicro-HouseCallTROJ_GEN.R002H0CKS21
IkarusTrojan.Win32.Crypt
FortinetW32/GenKryptik.CUBY!tr
AVGFileRepMalware
PandaTrj/GdSda.A

How to remove Trojan-Downloader.Win32.Gootkit.bpf?

Trojan-Downloader.Win32.Gootkit.bpf removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment