Trojan

Trojan.Win32.Zenpak.bbwb (file analysis)

Malware Removal

The Trojan.Win32.Zenpak.bbwb is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Zenpak.bbwb virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (3 unique times)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Ukrainian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Attempts to identify installed AV products by installation directory
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
iplogger.org
leatherbond.top

How to determine Trojan.Win32.Zenpak.bbwb?


File Info:

crc32: 2AC259EF
md5: 0f64dfaa815081f110456e9894a7771c
name: 0F64DFAA815081F110456E9894A7771C.mlw
sha1: 2d32280b058eefc202ec725b3fa644e9d657960b
sha256: 8d2e3cb6a7ee561bafe29716d678dd185419a969537eeaeb93a048b930895c9f
sha512: 249caa13cadedf9cd945d165998e101821916c3ca40daf274c502ae7266400011f9bbb25d6c98972b7ad4f8af14648a364da4d5bbbcf102e1fa4e234b5a84f10
ssdeep: 12288:Mj3TIK4rj04vOnb7JSjxLKJgZImhGurSm6m7ezMQjS6D:a3TIK4rjRvOnfJqLKJg/hG8R6eFQjz
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

InternalSurname: debaukd.ekze
Product: 1.7.7
FileVersions: 1.0.5.6
LegalCo: Copyri (C) 2019, permudationz

Trojan.Win32.Zenpak.bbwb also known as:

Elasticmalicious (high confidence)
DrWebTrojan.MulDrop16.3346
MicroWorld-eScanTrojan.GenericKDZ.72253
FireEyeGeneric.mg.0f64dfaa815081f1
McAfeeGenericRXAA-AA!0F64DFAA8150
CylanceUnsafe
SangforMalware
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderTrojan.GenericKDZ.72253
K7GWRiskware ( 0040eff71 )
CrowdStrikewin/malicious_confidence_100% (D)
CyrenW32/Kryptik.CVF.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:DropperX-gen [Drp]
KasperskyTrojan.Win32.Zenpak.bbwb
AlibabaTrojan:Win32/GenKryptik.fbe423ca
AegisLabTrojan.Win32.Malicious.4!c
Ad-AwareTrojan.GenericKDZ.72253
SophosMal/Generic-S
ComodoMalware@#2ogmp8fw4sm3
F-SecureTrojan.TR/Crypt.Agent.igxdg
McAfee-GW-EditionBehavesLike.Win32.Trojan.hc
EmsisoftTrojan.GenericKDZ.72253 (B)
SentinelOneStatic AI – Malicious PE
AviraTR/Crypt.Agent.igxdg
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Zenpack.MT!MTB
GridinsoftTrojan.Win32.Kryptik.oa
ArcabitTrojan.Generic.D11A3D
ZoneAlarmTrojan.Win32.Zenpak.bbwb
GDataTrojan.GenericKDZ.72253
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.Generic.C4282774
Acronissuspicious
MAXmalware (ai score=82)
MalwarebytesTrojan.MalPack.GS
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Kryptik.HILM
TrendMicro-HouseCallTROJ_GEN.R002H0CLS20
RisingBackdoor.Agent!8.C5D (TFE:5:IhzqwXEXQUL)
IkarusTrojan.Win32.Crypt
eGambitUnsafe.AI_Score_95%
FortinetW32/Kryptik.HGHW!tr
WebrootW32.Trojan.Gen
AVGWin32:DropperX-gen [Drp]
Cybereasonmalicious.b058ee
Paloaltogeneric.ml
Qihoo-360Generic/HEUR/QVM11.1.39B3.Malware.Gen

How to remove Trojan.Win32.Zenpak.bbwb?

Trojan.Win32.Zenpak.bbwb removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment