Trojan

Trojan.Heur.GM.000400A028 removal guide

Malware Removal

The Trojan.Heur.GM.000400A028 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Heur.GM.000400A028 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Trojan.Heur.GM.000400A028?


File Info:

name: 611C6A4D1AEBF072D4D4.mlw
path: /opt/CAPEv2/storage/binaries/5d389fe6e559b33db146f8d7bb15eea6917fc56ff80abdab0bedd4e0eecf9b16
crc32: 71F4A4C6
md5: 611c6a4d1aebf072d4d49025c8ad6800
sha1: efd77a3fb82723ab355d612d28ed13fff2de0171
sha256: 5d389fe6e559b33db146f8d7bb15eea6917fc56ff80abdab0bedd4e0eecf9b16
sha512: 9491d12be10d7252e694b7f6365f9977dd9c4732cd2db3609b1a3efd04370c917c77530c627a3c5f58e0345a1784aa136942d2e5ad776662e85b536d8f60d911
ssdeep: 96:4GQeuRS0uDvUw0oT70RWuI30tt7LpKOjgg7OfsIxHCyR762kLuYJOpohnk8FF7Hc:4fKY07BDAt7iDfSG7rkiYgpofFPQrj
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T172026B319398D9A3D64365BB73F30446746232309364B922318D196DBF24F24D9187B7
sha3_384: a422c447c33e21d5d727968a037b54304c5bb750fa18fa04595e104eeacf1a8cfbb06b78dd13439d77cf29de20900f56
ep_bytes: 558bec81ecac0000005356576064a130
timestamp: 1970-10-18 17:20:37

Version Info:

0: [No Data]

Trojan.Heur.GM.000400A028 also known as:

BkavW32.AIDetect.malware1
LionicHacktool.Win32.Katusha.li2P
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Trojan.Heur.GM.000400A028
FireEyeGeneric.mg.611c6a4d1aebf072
ALYacGen:Trojan.Heur.GM.000400A028
CylanceUnsafe
ZillyaBackdoor.Poison.Win32.1878
SangforSuspicious.Win32.Save.a
AlibabaBackdoor:Win32/Obfuscator.9da9032b
Cybereasonmalicious.d1aebf
VirITBackdoor.Win32.Generic.UOG
CyrenW32/PoisonIvy.J.gen!Eldorado
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Kryptik.BGB
APEXMalicious
Paloaltogeneric.ml
KasperskyPacked.Win32.Krap.c
BitDefenderGen:Trojan.Heur.GM.000400A028
NANO-AntivirusVirus.Win32.Gen.ccmw
AvastWin32:Evo-gen [Trj]
TencentWin32.Packed.Krap.Iajl
Ad-AwareGen:Trojan.Heur.GM.000400A028
TACHYONBackdoor/W32.Poison.8316
EmsisoftGen:Trojan.Heur.GM.000400A028 (B)
ComodoTrojWare.Win32.Trojan.Agent.~WEAD@2d95q0
DrWebBackDoor.Poison.40
VIPREGen:Trojan.Heur.GM.000400A028
TrendMicroTROJ_GEN.R27E1IK
McAfee-GW-EditionBehavesLike.Win32.PWSZbot.xc
Trapminemalicious.high.ml.score
SophosML/PE-A
IkarusPacker.Win32.Krap
JiangminBackdoor/PoisonIvy.bde
WebrootW32.PoisonIvy.Gen
GoogleDetected
AviraTR/Crypt.XPACK.Gen2
Antiy-AVLTrojan/Generic.ASMalwS.4
MicrosoftBackdoor:Win32/Poison.E
ArcabitTrojan.Heur.GM.000400A028
ViRobotBackdoor.Win32.Poison.8316
GDataGen:Trojan.Heur.GM.000400A028
CynetMalicious (score: 100)
Acronissuspicious
McAfeeArtemis!611C6A4D1AEB
MAXmalware (ai score=100)
VBA32Backdoor.Poison
MalwarebytesMalware.Heuristic.1004
TrendMicro-HouseCallTROJ_GEN.R27E1IK
RisingBackdoor.Poison!8.2D7 (TFE:1:TSCUVQ2p3jT)
YandexTrojan.GenAsa!AAyypbsLgG4
SentinelOneStatic AI – Suspicious PE
MaxSecureTrojan.Malware.300983.susgen
BitDefenderThetaAI:Packer.F6F12BCA1D
AVGWin32:Evo-gen [Trj]
PandaGeneric Malware
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Heur.GM.000400A028?

Trojan.Heur.GM.000400A028 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment