Trojan

How to remove “Trojan.Win32.Bublik.pef”?

Malware Removal

The Trojan.Win32.Bublik.pef is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Bublik.pef virus can do?

  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • Authenticode signature is invalid
  • Created a process from a suspicious location
  • Anomalous binary characteristics

How to determine Trojan.Win32.Bublik.pef?


File Info:

name: 22857736F23EB5F83F44.mlw
path: /opt/CAPEv2/storage/binaries/4dc5830009ab02cfae8f1721673192836a8ec4f5258fb465ff872d3e84dd213d
crc32: C6993350
md5: 22857736f23eb5f83f4424976b2cbea6
sha1: f863d512e1cada7798d4f65f91a62614038ea41b
sha256: 4dc5830009ab02cfae8f1721673192836a8ec4f5258fb465ff872d3e84dd213d
sha512: 2c278de086770af80fee81faae944fc34a0d2b574e272ab3266c921fce532195ea921bf62a129c45dcf98518ca5f8965bc1fe3fe7f660b5b2f0cda5b73075229
ssdeep: 192:nZcI7Ylt2OOZ98D3fLPeAxEzPI+EJj/2XY81MMloP:nikmHcGbeUc++Xh1MM+
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T196E21CE7F7D05910E56A5A3081F38A5710A2BCFC3E73A10F298973922E739D1A754DC5
sha3_384: f852ab0eb1509b76d31ba39d6f8a6a2f432a558167e03252964eb2f159eb55e6972ca12141d35976835979fa51b8af5b
ep_bytes: 558bec83c4d48d4dd851ff1524304000
timestamp: 2002-04-27 03:58:53

Version Info:

0: [No Data]

Trojan.Win32.Bublik.pef also known as:

LionicTrojan.Win32.Zbot.tpfO
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Upatre.Gen.3
FireEyeGeneric.mg.22857736f23eb5f8
CAT-QuickHealTrojanDownloader.Upatre.V4
McAfeeUpatre-FAAG!22857736F23E
CylanceUnsafe
ZillyaTrojan.Bublik.Win32.26797
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan-Downloader ( 0048f6391 )
AlibabaMalware:Win32/km_24340.None
K7GWTrojan-Downloader ( 0048f6391 )
Cybereasonmalicious.6f23eb
BitDefenderThetaGen:NN.ZexaF.34084.cq1@aOdRwbhi
CyrenW32/Trojan.NKRL-2285
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/TrojanDownloader.Waski.A
BaiduWin32.Trojan-Downloader.Waski.a
TrendMicro-HouseCallTROJ_UPATRE.SM37
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Win32.Bublik.pef
BitDefenderTrojan.Upatre.Gen.3
NANO-AntivirusTrojan.Win32.Zbot.cxtvcv
AvastWin32:Dropper-NWS [Trj]
RisingTrojan.DL.Win32.Upatre.aab (CLASSIC)
Ad-AwareTrojan.Upatre.Gen.3
EmsisoftTrojan.Upatre.Gen.3 (B)
ComodoTrojWare.Win32.Kryptik.CBXB@5a837k
DrWebTrojan.DownLoad3.28161
VIPRETrojan.Win32.Upatre.ab (v)
TrendMicroTROJ_UPATRE.SM37
McAfee-GW-EditionUpatre-FAAG!22857736F23E
SophosML/PE-A + Mal/Zbot-QL
APEXMalicious
JiangminTrojanSpy.Zbot.eegg
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan[Spy]/Win32.Zbot
GridinsoftRansom.Win32.Zbot.sa
MicrosoftTrojanDownloader:Win32/Upatre
ViRobotTrojan.Win32.Zbot.17920.A
GDataTrojan.Upatre.Gen.3
CynetMalicious (score: 100)
AhnLab-V3Dropper/Win32.Zbot.R106661
Acronissuspicious
VBA32Trojan.Zbot.1254
MAXmalware (ai score=80)
MalwarebytesMalware.AI.3412300828
TencentMalware.Win32.Gencirc.10cf9005
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Upatre.Gen
FortinetW32/Kryptik.GQIX!tr
AVGWin32:Dropper-NWS [Trj]
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Win32.Bublik.pef?

Trojan.Win32.Bublik.pef removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment