Trojan

Trojan.Win32.Fabookie.lx malicious file

Malware Removal

The Trojan.Win32.Fabookie.lx is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Fabookie.lx virus can do?

  • Attempts to connect to a dead IP:Port (2 unique times)
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • The executable is likely packed with VMProtect
  • Steals private information from local Internet browsers
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself

Related domains:

ip-api.com
www.facebook.com

How to determine Trojan.Win32.Fabookie.lx?


File Info:

crc32: A6761CB5
md5: ab1e4bc4dde85f5ca90985c707c64b38
name: AB1E4BC4DDE85F5CA90985C707C64B38.mlw
sha1: dd7aec7a81217b0f1006ae0e0436e8f5905bfbcb
sha256: ba71357a5a857b2b06f69971eac463e54d40150a99e6c37998831a6e0e291faf
sha512: 3279ae5b418c9678414b383b5a56015cc03f8d75d584a736288d34bf4fd2344ec3fce0a2ed91f4bb90f2cf5ff4904a29a7db6b57f457d36633ecae5515634501
ssdeep: 98304:dOgZ3cZ5x+clpJORwnbqpESGG5X7n5aA3Lkw3sTo:nMZz+RQbqphbbwP
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan.Win32.Fabookie.lx also known as:

BkavW32.AIDetectVM.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.44065639
FireEyeGeneric.mg.ab1e4bc4dde85f5c
CAT-QuickHealTrojan.Fabookie
ALYacTrojan.GenericKD.44065639
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
SangforMalware
K7AntiVirusTrojan ( 0057478d1 )
BitDefenderTrojan.GenericKD.44065639
K7GWTrojan ( 005723121 )
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderThetaGen:NN.ZexaF.34700.@BW@a4j@QDaj
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:Trojan-gen
ClamAVWin.Malware.Fabookie-9787393-0
KasperskyTrojan.Win32.Fabookie.lx
AlibabaTrojan:Win32/Fabookie.1654c751
NANO-AntivirusTrojan.Win32.Fabookie.iauvor
ViRobotTrojan.Win32.Z.Fabookie.4337152
RisingTrojan.Agent!8.B1E (TFE:5:q77RrlZo9JC)
Ad-AwareTrojan.GenericKD.44065639
SophosMal/Generic-S
ComodoMalware@#3u1156j1qyr55
F-SecureHeuristic.HEUR/AGEN.1139112
DrWebTrojan.DownLoader35.271
ZillyaTrojan.Agent.Win32.1521920
TrendMicroTROJ_GEN.R011C0GJH20
McAfee-GW-EditionBehavesLike.Win32.Generic.rc
EmsisoftTrojan.GenericKD.44065639 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Fabookie.jp
AviraHEUR/AGEN.1139112
MAXmalware (ai score=86)
MicrosoftTrojan:Win32/CryptInject!ml
ArcabitTrojan.Generic.D2A06367
ZoneAlarmTrojan.Win32.Fabookie.lx
GDataTrojan.GenericKD.44065639
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.Generic.C4212605
Acronissuspicious
McAfeeArtemis!AB1E4BC4DDE8
TACHYONTrojan/W32.Fabookie.4337152
VBA32Trojan.Fabookie
MalwarebytesTrojan.MalPack
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Agent.UAW
TrendMicro-HouseCallTROJ_GEN.R011C0GJH20
TencentWin32.Trojan.Fabookie.Lmaw
YandexTrojan.Fabookie!Rq6XWXi9b0k
IkarusTrojan.Win32.Agent
FortinetW32/Agent.UAW!tr
AVGWin32:Trojan-gen
Cybereasonmalicious.a81217
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.BO.b2a

How to remove Trojan.Win32.Fabookie.lx?

Trojan.Win32.Fabookie.lx removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment