Trojan

About “Trojan.Win32.Zenpak.bbxv” infection

Malware Removal

The Trojan.Win32.Zenpak.bbxv is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Zenpak.bbxv virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Attempts to connect to a dead IP:Port (5 unique times)
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Ukrainian
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Steals private information from local Internet browsers
  • Attempts to access Bitcoin/ALTCoin wallets
  • Attempts to create or modify system certificates
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
telete.in
apps.identrust.com
trashbininspector.fun

How to determine Trojan.Win32.Zenpak.bbxv?


File Info:

crc32: 8C4439E1
md5: 0f557b557aa8f700c111fac16ac532a4
name: 0F557B557AA8F700C111FAC16AC532A4.mlw
sha1: f9cdcdc171a1153bf984a00bca16668eaf37e82b
sha256: 873e8fdc6744802bdd4372c9d752dd8d63c02a51a68dec3b328a02d0262c58f8
sha512: 42b51fba752149e818a7d97c0b272b4b2b9c8f489943ccfe88bf9e22b57411839ac97cab267fa34ad80506f1dc8ac4b1078fd218a5888f17d95718e3c432e339
ssdeep: 12288:WdlPDMHmA7dIXLfOABuhj+ixrWqYCDpAoIsGBjxAohv6MH:WfPDMHdIXbBuhj+eYmpAo6jtQ
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

InternalSurname: debaukd.ekze
Prod: 1.2.7
FileVersions: 1.0.5.6
LegalCo: Copyri (C) 2019, permudationzi

Trojan.Win32.Zenpak.bbxv also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.45227795
McAfeeRDN/GenericM
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 005756611 )
BitDefenderTrojan.GenericKD.45227795
K7GWTrojan ( 005756611 )
CrowdStrikewin/malicious_confidence_100% (D)
CyrenW32/Trojan.AYNC-0604
SymantecML.Attribute.HighConfidence
APEXMalicious
Paloaltogeneric.ml
KasperskyTrojan.Win32.Zenpak.bbxv
AlibabaBackdoor:Win32/Zenpack.dbfc6348
ViRobotTrojan.Win32.Z.Malpack.463872
AegisLabTrojan.Win32.Zenpak.4!c
RisingBackdoor.Agent!8.C5D (TFE:5:IhzqwXEXQUL)
Ad-AwareTrojan.GenericKD.45227795
EmsisoftTrojan.Crypt (A)
ComodoMalware@#4e0fyin8oxyd
F-SecureTrojan.TR/AD.StellarStealer.deane
DrWebTrojan.Siggen11.56849
TrendMicroTrojanSpy.Win32.ZENPAK.USMANLU20
McAfee-GW-EditionBehavesLike.Win32.Trojan.gc
SophosMal/Generic-S
IkarusTrojan-Spy.Win32.Raccoon
JiangminTrojan.Zenpak.fhf
AviraTR/AD.StellarStealer.deane
MAXmalware (ai score=85)
KingsoftWin32.Troj.Generic_a.a.(kcloud)
MicrosoftTrojan:Win32/Zenpack.MU!MTB
GridinsoftTrojan.Win32.Packed.oa
ArcabitTrojan.Generic.D2B21F13
ZoneAlarmTrojan.Win32.Zenpak.bbxv
GDataTrojan.GenericKD.45227795
CynetMalicious (score: 100)
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.34700.CmGfaegb!Rmc
ALYacTrojan.GenericKD.45227795
VBA32Trojan.Azorult
MalwarebytesTrojan.MalPack.GS
PandaTrj/GdSda.A
ESET-NOD32a variant of Win32/Kryptik.HILR
TrendMicro-HouseCallTrojanSpy.Win32.ZENPAK.USMANLU20
TencentWin32.Trojan.Zenpak.Hpd
SentinelOneStatic AI – Suspicious PE
eGambitUnsafe.AI_Score_90%
FortinetW32/Kryptik.HGHW!tr
WebrootW32.Trojan.Glupteba
AVGWin32:DropperX-gen [Drp]
Cybereasonmalicious.171a11
AvastWin32:DropperX-gen [Drp]
Qihoo-360Win32/Trojan.a3a

How to remove Trojan.Win32.Zenpak.bbxv?

Trojan.Win32.Zenpak.bbxv removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment