Trojan

Trojan.Win32.Bublik.cicr (file analysis)

Malware Removal

The Trojan.Win32.Bublik.cicr is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Bublik.cicr virus can do?

  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Trojan.Win32.Bublik.cicr?


File Info:

name: DBD8CB5817686A272E96.mlw
path: /opt/CAPEv2/storage/binaries/b8e9d34013bbca82755cd17b693e8cec68b40d9a62445163f1118f2907a5c40f
crc32: C647AA9E
md5: dbd8cb5817686a272e9673277aee52d1
sha1: 3786d2e7bd3387034d196de01eaae7b88e4237af
sha256: b8e9d34013bbca82755cd17b693e8cec68b40d9a62445163f1118f2907a5c40f
sha512: d21763c76d86e35e1e8d6b7f409978b69a0004314771b571994ddb3b4c90e8caac2fe664ab12847d1dfbb43da4b1892dcf7bc63221e6d184a0a85897137d81cf
ssdeep: 192:SRTQZOwUdXbg2+K+mBPu5wwKqlMJ7/+K+J3QUyqQ8888Lb8+nZ5LfH2kPdi+0J0z:WW5wwhuqL6hwqH
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T137727226A2918A6BE7F38333157FAB4886273DA1FA75461D744D730D4D3126C46FC23A
sha3_384: ecbcf492fb51094c98f250e5f1252d1fac6408c7e50b39be56d14a55a8f45b8fdc4d52f849e643d39dfaf0b74a9a9d2e
ep_bytes: 55bd00104000e88c010000e993090000
timestamp: 2006-12-25 08:09:52

Version Info:

0: [No Data]

Trojan.Win32.Bublik.cicr also known as:

BkavW32.FamVT.GeND.Trojan
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.45473540
ClamAVWin.Trojan.Generickd-553
FireEyeGeneric.mg.dbd8cb5817686a27
CAT-QuickHealTrojanDownloader.Upatre.A4
McAfeeDownloader-FSH
CylanceUnsafe
VIPRETrojan.GenericKD.45473540
SangforSuspicious.Win32.Save.a
CrowdStrikewin/malicious_confidence_70% (D)
K7GWTrojan-Downloader ( 0048f6391 )
K7AntiVirusTrojan-Downloader ( 0048f6391 )
BaiduWin32.Trojan-Downloader.Waski.a
VirITTrojan.Win32.Zbot.HAF
CyrenW32/Trojan.XQSJ-0631
SymantecDownloader.Upatre!gen4
tehtrisGeneric.Malware
ESET-NOD32Win32/TrojanDownloader.Waski.A
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Bublik.cicr
BitDefenderTrojan.GenericKD.45473540
NANO-AntivirusTrojan.Win32.Bublik.cwgsjb
SUPERAntiSpywareTrojan.Agent/Gen-Bublik
AvastWin32:Agent-AUID [Trj]
TencentMalware.Win32.Gencirc.11497006
Ad-AwareTrojan.GenericKD.45473540
SophosML/PE-A + Troj/Upatre-AP
ComodoTrojWare.Win32.TrojanDownloader.Waski.ZR@59gqq9
DrWebTrojan.DownLoad3.32667
ZillyaTrojan.Bublik.Win32.13494
McAfee-GW-EditionDownloader-FSH!DBD8CB581768
Trapminemalicious.high.ml.score
EmsisoftTrojan.GenericKD.45473540 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan/Bublik.gwz
WebrootW32.Malware.Gen
AviraTR/Spy.Zbot.yhse
Antiy-AVLTrojan/Generic.ASMalwS.555
MicrosoftTrojan:Win32/Trickbot.GML!MTB
ArcabitTrojan.Generic.D2B5DF04
GDataTrojan.GenericKD.45473540
GoogleDetected
AhnLab-V3Downloader/Win32.Upatre.R103993
BitDefenderThetaGen:NN.ZexaF.34698.bmX@aOjuFJfi
ALYacTrojan.GenericKD.45473540
MAXmalware (ai score=87)
VBA32Trojan.Bublik
MalwarebytesTrojan.Email.FakeDoc
RisingTrojan.DL.Win32.Upatre.akx (CLASSIC)
YandexTrojan.Bublik!CYmAAvalWwY
IkarusTrojan-Spy.Zbot
MaxSecureTrojan.Upatre.Gen
FortinetW32/Waski.A!tr
AVGWin32:Agent-AUID [Trj]
Cybereasonmalicious.817686
PandaTrj/Zbot.R

How to remove Trojan.Win32.Bublik.cicr?

Trojan.Win32.Bublik.cicr removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment