Trojan

Trojan.Win32.Eb.bpo (file analysis)

Malware Removal

The Trojan.Win32.Eb.bpo is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Eb.bpo virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • Expresses interest in specific running processes
  • Unconventionial language used in binary resources: Serbian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Trojan.Win32.Eb.bpo?


File Info:

crc32: 9C196F04
md5: 0f776955c7f44c160826c7c4a934d11a
name: 0F776955C7F44C160826C7C4A934D11A.mlw
sha1: d901bce06e8619bc6ce7a1609e1dc164846da356
sha256: a2d86f964f6f48f52af199d3ef382dcdc0a34adfca397e3e69298848b597873b
sha512: b9c5a95efbbe179e0aa523bf7d7ad8a65f0816ca484ca0c0a391d6defee2fe79733c2bb7602920d0d3a51e9f32ed50ed5468977084822d8260c4cd0a5bf490af
ssdeep: 98304:lBspq1qr0HNxwqKu7QRfrC6TULgc/C4lB/4vR+9KmWGKFCKNk8nVlt3CZdcJEZV:T/xkjdckXJQKNGabusC3MKNwuf9ca9g
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

InternalName: triwilbifor.occ
FileVersion: 6.26.343
Copyright: Copyrighz (C) 2020, wodkagude
ProductVersion: 1.13.22
TranslationUsa: 0x0173 0x00e1

Trojan.Win32.Eb.bpo also known as:

Elasticmalicious (high confidence)
DrWebTrojan.Siggen11.58931
MicroWorld-eScanTrojan.GenericKD.45538295
Qihoo-360Win32/Trojan.72e
McAfeeArtemis!0F776955C7F4
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 0057667c1 )
BitDefenderTrojan.GenericKD.45538295
K7GWTrojan ( 0057667c1 )
Cybereasonmalicious.06e861
BitDefenderThetaGen:NN.ZexaF.34780.@pKfaO5qKOpG
CyrenW32/Kryptik.DBB.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:TrojanX-gen [Trj]
KasperskyTrojan.Win32.Eb.bpo
AlibabaTrojan:Win32/Azorult.7d906cfb
AegisLabTrojan.Win32.Malicious.4!c
Ad-AwareTrojan.GenericKD.45538295
SophosMal/Generic-S
F-SecureTrojan.TR/AD.GoCloudnet.rlufg
McAfee-GW-EditionBehavesLike.Win32.Trojan.rc
FireEyeGeneric.mg.0f776955c7f44c16
EmsisoftTrojan.GenericKD.45538295 (B)
IkarusTrojan.WinGo.Ranumbot
WebrootW32.Trojan.Gen
AviraTR/AD.GoCloudnet.rlufg
MicrosoftTrojan:Win32/Azorult.MU!MTB
GridinsoftTrojan.Win32.Packed.oa
ArcabitTrojan.Generic.D2B6DBF7
ZoneAlarmTrojan.Win32.Eb.bpo
GDataWin32.Trojan.RanumBot.CT6R10
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.Generic.C4303928
Acronissuspicious
VBA32BScope.Trojan.Azorult
ALYacTrojan.GenericKD.45538295
MAXmalware (ai score=99)
MalwarebytesGeneric.Trojan.Malicious.DDS
PandaTrj/GdSda.A
ESET-NOD32WinGo/RanumBot.J
RisingTrojan.Kryptik!8.8 (TFE:5:yLLlZ3TYilR)
YandexTrojan.Igent.bVcezo.29
SentinelOneStatic AI – Malicious PE
FortinetW32/Kryptik.HIRY!tr
AVGWin32:TrojanX-gen [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan.Win32.Eb.bpo?

Trojan.Win32.Eb.bpo removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment