Trojan

Trojan.Win32.Zenpak.bdfi removal tips

Malware Removal

The Trojan.Win32.Zenpak.bdfi is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Zenpak.bdfi virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Expresses interest in specific running processes
  • Unconventionial language used in binary resources: Polish
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

How to determine Trojan.Win32.Zenpak.bdfi?


File Info:

crc32: 67154F3F
md5: 197a536cd9049d85e1f6a85237c17df6
name: 197A536CD9049D85E1F6A85237C17DF6.mlw
sha1: e341633800e9dc6f88b5480456f8b3eb83e3f737
sha256: bae7fd8862998506793960614d6554c9b78d13ec9241a08427e8baa18f5f54f0
sha512: 7fbab6ea9b2b1a68cb9f017c55488d23ce36bddd5a1d719e612b49aa39688f52df2bdc2bb1a9e272d2b137d9305cbf9b8e64008b8b0483297ba20c9f461170f0
ssdeep: 98304:JWa4t2Twj80PYm7rfzbnmJoHEi57f2g93Qbm84x3etrBt5Cq11gLQZyW10tBIOx:Nm80vDuYt6iYZvO77CWug3aY
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

InternalSurname: debag.ekze
Prod: 1.2.5
FileVersions: 1.0.5.8
LegalCo: Copyri (C) 2019, permudationzy

Trojan.Win32.Zenpak.bdfi also known as:

Elasticmalicious (high confidence)
ClamAVWin.Packed.Tofsee-9820480-0
FireEyeTrojan.GenericKD.45404744
McAfeeArtemis!197A536CD904
CylanceUnsafe
ZillyaTrojan.Windigo.Win32.346
AegisLabTrojan.Win32.Zenpak.4!c
SangforMalware
K7AntiVirusTrojan ( 00575d741 )
BitDefenderTrojan.GenericKD.45404744
K7GWTrojan ( 00575d741 )
Cybereasonmalicious.800e9d
CyrenW32/Kryptik.CXI.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:BotX-gen [Trj]
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Zenpak.bdfi
AlibabaBackdoor:Win32/Glupteba.70cd9270
MicroWorld-eScanTrojan.GenericKD.45404744
Ad-AwareTrojan.GenericKD.45404744
EmsisoftTrojan.GenericKD.45404744 (B)
ComodoMalware@#1nxq96tdrzjnj
F-SecureTrojan.TR/AD.GoCloudnet.hpdns
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_GEN.F0CBC0UAJ21
McAfee-GW-EditionBehavesLike.Win32.Trojan.rc
SophosMal/Generic-S
IkarusTrojan.MalPack
JiangminTrojan.Zenpak.frj
WebrootW32.Trojan.Gen
AviraTR/AD.GoCloudnet.hpdns
MAXmalware (ai score=86)
Antiy-AVLGrayWare/Win32.Kryptik.hghw
KingsoftWin32.Troj.Generic_a.a.(kcloud)
MicrosoftTrojan:Win32/Glupteba.KMG!MTB
GridinsoftTrojan.Win32.Packed.oa
ArcabitTrojan.Generic.D2B4D248
ZoneAlarmTrojan.Win32.Zenpak.bdfi
GDataTrojan.GenericKD.45404744
AhnLab-V3Malware/Win32.RL_Generic.R362780
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.34780.@pGfaGSwvjjG
ALYacTrojan.GenericKD.45404744
VBA32Trojan.Zenpak
MalwarebytesTrojan.MalPack.GS
PandaTrj/GdSda.A
ESET-NOD32WinGo/RanumBot.J
TrendMicro-HouseCallTROJ_GEN.F0CBC0UAJ21
RisingTrojan.Ransom.GlobeImposter!1.AF70 (TFE:5:bYXJg1YG3DR)
YandexTrojan.GenAsa!A3rOJaxYS2w
SentinelOneStatic AI – Malicious PE
FortinetW32/Kryptik.HGHW!tr
AVGWin32:BotX-gen [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_90% (D)
Qihoo-360Win32/Trojan.f17

How to remove Trojan.Win32.Zenpak.bdfi?

Trojan.Win32.Zenpak.bdfi removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment