Trojan

Should I remove “Trojan.Win32.Hedo.bmkt”?

Malware Removal

The Trojan.Win32.Hedo.bmkt is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Hedo.bmkt virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Dynamic (imported) function loading detected
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid

How to determine Trojan.Win32.Hedo.bmkt?


File Info:

name: 5887953AD2020D71A868.mlw
path: /opt/CAPEv2/storage/binaries/098f123dac478e9c99e3d185b47bb897d2098f1c3e58e689bfaa226965e1098f
crc32: 6A345CFC
md5: 5887953ad2020d71a86802aa5a8ec71c
sha1: bf34df68ed540029c853ec2f32c29422f3f9ed54
sha256: 098f123dac478e9c99e3d185b47bb897d2098f1c3e58e689bfaa226965e1098f
sha512: d97ea60209cf9298b50c2cc3cb5845524a9ed9dab813465bf01275f3605c6e642efcd359ffdcef40e71d480ce6f0349f027186e97fe8292b1f31390cef0c1845
ssdeep: 6144:23VzVvVGVvVQVvVGVvVcVvVFVvVGVvVQVvVGVvVzVvVGVvVQVvVGVvVZVvVGVvVE:
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1DE767E43A9CCB576CB9B02372A94DA3811E82190D7484B02FBFD397ABFC6AD1354E355
sha3_384: d6cde4dea1c1926a13d4c83ade832d74994de41ee61fa5d06e6c7b22a637e291979c500f18fa5df3f5ec61e9130603fb
ep_bytes: 60be158040008dbeeb8fffff5783cdff
timestamp: 2016-03-01 22:44:44

Version Info:

0: [No Data]

Trojan.Win32.Hedo.bmkt also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Generic.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Agent.EYLR
FireEyeGeneric.mg.5887953ad2020d71
CAT-QuickHealTrojan.AgentbPMF.S26395285
ALYacTrojan.Agent.EYLR
CylanceUnsafe
ZillyaTrojan.Agent.Win32.2590810
SangforTrojan.Win32.Generic.ky
K7AntiVirusTrojan ( 0058876d1 )
AlibabaTrojan:Win32/Generic.44c6d319
K7GWTrojan ( 0058876d1 )
CrowdStrikewin/malicious_confidence_100% (W)
VirITTrojan.Win32.Agent3.CIEB
CyrenW32/Agent.DOR.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Agent.ADMM
APEXMalicious
AvastWin32:Malware-gen
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Hedo.bmkt
BitDefenderTrojan.Agent.EYLR
NANO-AntivirusTrojan.Win32.Agent.epwdel
TencentTrojan.Win32.Agent.wb
Ad-AwareTrojan.Agent.EYLR
EmsisoftTrojan.Agent.EYLR (B)
DrWebTrojan.Siggen15.22576
TrendMicroSuspicious
McAfee-GW-EditionBehavesLike.Win32.Generic.wc
SophosMal/Generic-S
Paloaltogeneric.ml
GDataWin32.Trojan.PSE.1YNUJ22
JiangminTrojan.Agent.dlnq
AviraTR/Crypt.ULPM.Gen
Antiy-AVLTrojan/Win32.SGeneric
GridinsoftRansom.Win32.Zbot.sa
ArcabitTrojan.Agent.EYLR
ViRobotTrojan.Win32.Z.Agent.7651328.CM
ZoneAlarmTrojan.Win32.Hedo.bmkt
MicrosoftPWS:Win32/Zbot!ml
AhnLab-V3Trojan/Win.QE.C4744266
McAfeeArtemis!5887953AD202
MAXmalware (ai score=87)
VBA32Trojan.Agentb
MalwarebytesTrojan.Dropper
TrendMicro-HouseCallSuspicious
RisingTrojan.Agent!1.D9AC (RDMK:cmRtazrdeCWSL7z1mCFchqZYkLw5)
YandexTrojan.Fuery!D+JupAt/MK4
SentinelOneStatic AI – Malicious PE
FortinetW32/Agent.ADMM!tr
BitDefenderThetaGen:NN.ZexaF.34212.@pJfaix7qjpi
AVGWin32:Malware-gen
Cybereasonmalicious.ad2020
PandaTrj/Genetic.gen
MaxSecureTrojan.Malware.7164915.susgen

How to remove Trojan.Win32.Hedo.bmkt?

Trojan.Win32.Hedo.bmkt removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment