Trojan

Trojan.Win32.Zenpak.bbxg malicious file

Malware Removal

The Trojan.Win32.Zenpak.bbxg is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Zenpak.bbxg virus can do?

  • Executable code extraction
  • Creates RWX memory
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Ukrainian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Looks up the external IP address
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Network activity detected but not expressed in API logs
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

admex175x.xyz
servx278x.xyz
api.ipify.org

How to determine Trojan.Win32.Zenpak.bbxg?


File Info:

crc32: 029F248D
md5: a8538564ed0e0b9eaf45640315a4952d
name: A8538564ED0E0B9EAF45640315A4952D.mlw
sha1: 64baf5586bf6663200a5d9901484a4bedc26792f
sha256: 9314077b03f96b02c8acea5ec163d5cb61cc447b512c777328d705b559c6c1d3
sha512: a97ee9f88e31b2193864cf66ee7e8d5233b4b1690bdb44149ef4969c0f51726393991346d8d7d118ba7c07c45add40805bffc92facb22e94e6b970ee1a625669
ssdeep: 1536:zkr9hGJQ81MxBNggeDTw3LsPGdx6YpvXeTjB3Dc6mmFXiidg1NUF1sdQSris:rKxBNeX8r6YEB3VFSiaNUA7is
type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed

Version Info:

InternalSurname: debaukd.ekze
Product: 1.2.7
FileVersions: 1.0.5.6
LegalCo: Copyri (C) 2019, permudationz

Trojan.Win32.Zenpak.bbxg also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.45219114
FireEyeGeneric.mg.a8538564ed0e0b9e
McAfeeArtemis!A8538564ED0E
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 005755b11 )
BitDefenderTrojan.GenericKD.45219114
K7GWTrojan ( 005755b11 )
BitDefenderThetaGen:NN.ZexaF.34700.imGfaKvKXOgc
CyrenW32/Kryptik.CVF.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HILM
APEXMalicious
AvastWin32:DropperX-gen [Drp]
KasperskyTrojan.Win32.Zenpak.bbxg
AlibabaBackdoor:Win32/Zenpack.2d19b47b
ViRobotTrojan.Win32.Z.Kryptik.142336.II
RisingBackdoor.Agent!8.C5D (TFE:5:IhzqwXEXQUL)
Ad-AwareTrojan.GenericKD.45219114
EmsisoftTrojan.GenericKD.45219114 (B)
ComodoMalware@#3s9mkc9o8fwyk
F-SecureTrojan.TR/AD.Coroxy.ocayj
DrWebTrojan.PWS.Siggen2.58526
McAfee-GW-EditionBehavesLike.Win32.Trojan.ch
SophosMal/Generic-S
IkarusTrojan.Win32.Crypt
JiangminExploit.ShellCode.beh
AviraTR/AD.Coroxy.ocayj
MAXmalware (ai score=86)
Antiy-AVLTrojan/Win32.Kryptik
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Wacatac.D9!ml
GridinsoftTrojan.Win32.Kryptik.oa
ArcabitTrojan.Generic.D2B1FD2A
AhnLab-V3Trojan/Win32.MalPe.R361070
ZoneAlarmTrojan.Win32.Zenpak.bbxg
GDataTrojan.GenericKD.45219114
CynetMalicious (score: 100)
Acronissuspicious
VBA32Trojan.Agent
ALYacTrojan.GenericKD.45219114
MalwarebytesTrojan.MalPack.GS
PandaTrj/GdSda.A
TencentWin32.Trojan.Zenpak.Lmkh
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_93%
FortinetW32/Kryptik.HGHW!tr
WebrootW32.Malware.Gen
AVGWin32:DropperX-gen [Drp]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360Generic/HEUR/QVM11.1.3CDB.Malware.Gen

How to remove Trojan.Win32.Zenpak.bbxg?

Trojan.Win32.Zenpak.bbxg removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment