Trojan

Trojan.Heur.SFM.Rq2baK!oczbj (file analysis)

Malware Removal

The Trojan.Heur.SFM.Rq2baK!oczbj is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Heur.SFM.Rq2baK!oczbj virus can do?

  • Executable code extraction
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Deletes its original binary from disk
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Creates known PcClient mutex and/or file changes.
  • Anomalous binary characteristics

Related domains:

ll14.com
kill1239.5166.info

How to determine Trojan.Heur.SFM.Rq2baK!oczbj?


File Info:

crc32: 1A27ABCE
md5: 37900245e5856d53be7737a5adf5ac8d
name: 37900245E5856D53BE7737A5ADF5AC8D.mlw
sha1: 692cb886cfae78532f7cd07465d4a95032613535
sha256: 83fbbd31e43ad25a8921c98d97b287ebc8902451f7647c2266e5f0688471e8b6
sha512: 5e5feb4a1a9cb0d59acdbce927a560d90313ebeda5878c0d088a60d129dee6cc1cd7afd537cdeaa0c788c35b9e63db8e1551f3f0887727a409af584b8f3da269
ssdeep: 12288:4v1EY7o5XC9FqGDbsRwj9VP1THHk8S18F6OnuDw9l:017uXCPqYsRwj9/bHkFS9l
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: (C) 360.cn Inc. All Rights Reserved.
InternalName: 360DrvMgr.exe
FileVersion: 2.0.0.1540
CompanyName: 360.cn
ProductName: 360x9a71x52a8x5927x5e08
ProductVersion: 2.0.0.1540
FileDescription: 360x9a71x52a8x5927x5e08x4e3bx7a0bx5e8f
OriginalFilename: 360DrvMgr.exe
Translation: 0x0409 0x04b0

Trojan.Heur.SFM.Rq2baK!oczbj also known as:

Elasticmalicious (high confidence)
DrWebTrojan.DownLoader11.56443
CynetMalicious (score: 100)
CAT-QuickHealBackdoor.Farfli.K2
ALYacGen:Trojan.Heur.SFM.Rq2baK!oczbj
CylanceUnsafe
CrowdStrikewin/malicious_confidence_80% (W)
Cybereasonmalicious.5e5856
BaiduWin32.Trojan.Farfli.ai
CyrenW32/OnlineGames.BW.gen!Eldorado
SymantecBackdoor.Trojan
ESET-NOD32a variant of Win32/Farfli.CUF
APEXMalicious
AvastFileRepMalware
ClamAVWin.Trojan.Farfli-9754465-0
KasperskyRootkit.Win32.Ressdt.hd
BitDefenderGen:Trojan.Heur.SFM.Rq2baK!oczbj
NANO-AntivirusTrojan.Win32.OnlineGames.gxrhkm
MicroWorld-eScanGen:Trojan.Heur.SFM.Rq2baK!oczbj
TencentBackdoor.Win32.Gh0st.g
Ad-AwareGen:Trojan.Heur.SFM.Rq2baK!oczbj
SophosMal/Generic-S
BitDefenderThetaAI:Packer.7A6B47E720
VIPREBackdoor.Win32.Farfli.A (v)
TrendMicroTROJ_GEN.R005C0DHJ21
McAfee-GW-EditionGenericRXCW-OJ!FEF5CF7F6BD9
FireEyeGeneric.mg.37900245e5856d53
EmsisoftGen:Trojan.Heur.SFM.Rq2baK!oczbj (B)
SentinelOneStatic AI – Suspicious PE
JiangminHeur:Trojan/KillAV
AviraTR/Rootkit.Gen
eGambitPE.Heur.InvalidSig
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataGen:Trojan.Heur.SFM.Rq2baK!oczbj
AhnLab-V3Trojan/Win32.Magania.C208748
McAfeeArtemis!37900245E585
MAXmalware (ai score=87)
VBA32Backdoor.Xtreme
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_GEN.R005C0DHJ21
YandexTrojan.Redosdru.Gen
IkarusTrojan.Win32.Farfli
FortinetW32/Magania.ADW!tr.pws
AVGFileRepMalware

How to remove Trojan.Heur.SFM.Rq2baK!oczbj?

Trojan.Heur.SFM.Rq2baK!oczbj removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment