Spy Trojan

Trojan-Spy.Win32.Bobik.fsh removal tips

Malware Removal

The Trojan-Spy.Win32.Bobik.fsh is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Bobik.fsh virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Dynamic (imported) function loading detected
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the RedLine malware family
  • Anomalous binary characteristics

How to determine Trojan-Spy.Win32.Bobik.fsh?


File Info:

name: 6313021027D235FA1214.mlw
path: /opt/CAPEv2/storage/binaries/60af069365304f3aed323f3817344b31c62e20589518a1b72dd7de7a990f816a
crc32: DD46FCC9
md5: 6313021027d235fa1214e5ee7413d747
sha1: c8252fe578604050d4ccd57c604c78e509245156
sha256: 60af069365304f3aed323f3817344b31c62e20589518a1b72dd7de7a990f816a
sha512: bd18ff3702cdfdbfa5ea9308c61c32a08bf9633dce945cdfa491257a2d9935ac0c5df049b616518d7e39df449877f4a67d8a003f241b81c4eb7d38577d2735fb
ssdeep: 3072:pDKW1LgppLRHMY0TBfJvjcTp5Xs8dGKvJAbJlEbluqBIuTj/T:pDKW1Lgbdl0TBBvjc/58KvebEpBIuTX
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T14814AE2175C1C1B3C5B7113084E5CB765A7A3072076A92D7BB9D2BBA6F212E1A3352CE
sha3_384: 39c86f5a6344a2ee20fad4a5c35116ce5019647c44203bdb1bdeeb2bda8d11ca961cd433381d69c99e5de30c9c37569f
ep_bytes: e8e15c0000e9a4feffff8bff558bec83
timestamp: 2012-07-13 22:47:16

Version Info:

Translation: 0x0000 0x04b0
Comments:
CompanyName:
FileDescription: ConsoleApp11
FileVersion: 1.0.0.0
InternalName: ConsoleApp11.exe
LegalCopyright: Copyright © 2021
LegalTrademarks:
OriginalFilename: ConsoleApp11.exe
ProductName: ConsoleApp11
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

Trojan-Spy.Win32.Bobik.fsh also known as:

LionicTrojan.Win32.Bobik.l!c
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.GenericKD.36113897
FireEyeGeneric.mg.6313021027d235fa
ALYacTrojan.GenericKD.36113897
CylanceUnsafe
SangforTrojan.Win32.Save.a
Cybereasonmalicious.027d23
BitDefenderThetaGen:NN.ZexaF.34742.mq0@aSMQ2Jl
Elasticmalicious (high confidence)
Paloaltogeneric.ml
KasperskyTrojan-Spy.Win32.Bobik.fsh
BitDefenderTrojan.GenericKD.36113897
SUPERAntiSpywareTrojan.Agent/Gen-MSIL
AvastWin32:Malware-gen
TencentWin32.Trojan-spy.Bobik.Wlff
Ad-AwareTrojan.GenericKD.36113897
EmsisoftTrojan.GenericKD.36113897 (B)
ComodoMalware@#2va1t1y1c8jn5
McAfee-GW-EditionBehavesLike.Win32.Generic.cc
Trapminemalicious.high.ml.score
SophosMal/Generic-S
APEXMalicious
GDataTrojan.GenericKD.36113897
WebrootW32.Trojan.Gen
AviraTR/Spy.Bobik.cxjde
MAXmalware (ai score=87)
MicrosoftBackdoor:Win32/Bladabindi!ml
CynetMalicious (score: 100)
McAfeeArtemis!6313021027D2
VBA32TrojanSpy.Bobik
IkarusTrojan.SuspectCRC
RisingTrojan.Generic@AI.100 (RDML:23Ir2y4TrFK+/pd2AzRREw)
YandexTrojanSpy.Bobik!P9L1God8eW8
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Bobik.FSH!tr
AVGWin32:Malware-gen
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Trojan-Spy.Win32.Bobik.fsh?

Trojan-Spy.Win32.Bobik.fsh removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment