The TrojanDownloader:Win32/Dofoil.R is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.
Gridinsoft Anti-Malware
Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
What TrojanDownloader:Win32/Dofoil.R virus can do?
- Executable code extraction
- Injection (inter-process)
- Injection (Process Hollowing)
- Attempts to connect to a dead IP:Port (4 unique times)
- Creates RWX memory
- A named pipe was used for inter-process communication
- Starts servers listening on 127.0.0.1:0
- Expresses interest in specific running processes
- Drops a binary and executes it
- Performs some HTTP requests
- The binary likely contains encrypted or compressed data.
- Executed a process and injected code into it, probably while unpacking
- Deletes its original binary from disk
- Enumerates services, possibly for anti-virtualization
- Crashed cuckoomon during analysis. Report this error to the Github repo.
- A process attempted to delay the analysis task by a long amount of time.
- Tries to unhook or modify Windows functions monitored by Cuckoo
- Steals private information from local Internet browsers
- A system process is generating network traffic likely as a result of process injection
- Mimics the file times of a Windows system file
- Installs itself for autorun at Windows startup
- Exhibits possible ransomware file modification behavior
- Creates a hidden or system file
- Attempts to modify proxy settings
- Creates a copy of itself
- Attempts to modify or disable Security Center warnings
- Anomalous binary characteristics
Related domains:
monsterbobz.net |
florasister.com |
crl3.digicert.com |
ocsp.digicert.com |
How to determine TrojanDownloader:Win32/Dofoil.R?
File Info:
crc32: CFBF5F09md5: 54b086ccc3dfd60fbc255f1137e4f6d4name: 54B086CCC3DFD60FBC255F1137E4F6D4.mlwsha1: 44f335d5287fee5426d1c0ad62a3458c6fe94193sha256: dda8c473879b6b4f09611989c26670fd0b1a35783ca8c8aec1155dd8608a00cbsha512: 399fd38ad22ec547debb0a58ce534af563cd38ec3293404c9bbe276c960eb561b6fb7bdc74b2c196c534f7fa5eba3d1eef17c20ba59b0b2d16c8bfd79abcda84ssdeep: 12288:TfLvl8cioA9CLJjpBZIlepegwLgtXAP3SsEb/:Tf7DBAaJjpcKtu3Q7type: PE32 executable (GUI) Intel 80386, for MS WindowsVersion Info:
Translation: 0x0409 0x04b0LegalCopyright: xae TradeMark 2001-2011 C.U.B.EInternalName: aFileVersion: 2.11CompanyName: Softwareentwicklung YuschukLegalTrademarks: C.U.B.E Corp xa9 http:\www.CUBECORP.TVComments: This Program Check Booking And PreservationProductName: Booking CheckProductVersion: 2.11FileDescription: Booking Checking V2OriginalFilename: a.exe
TrojanDownloader:Win32/Dofoil.R also known as:
Bkav | W32.AIDetectVM.malware2 |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Heur.Zygug.5 |
FireEye | Generic.mg.54b086ccc3dfd60f |
McAfee | Artemis!54B086CCC3DF |
Cylance | Unsafe |
VIPRE | Trojan.Win32.Generic!BT |
AegisLab | Trojan.Multi.Generic.4!c |
Sangfor | Malware |
BitDefender | Gen:Heur.Zygug.5 |
Cybereason | malicious.cc3dfd |
BitDefenderTheta | Gen:NN.ZevbaF.34804.Jm1@aelZIQcO |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.ACPT |
APEX | Malicious |
Avast | Win32:Malware-gen |
ClamAV | Win.Trojan.Zurgop-7586567-0 |
Kaspersky | Trojan-Downloader.Win32.Dofoil.bvwc |
NANO-Antivirus | Trojan.Win32.TrjGen.cbfobn |
Ad-Aware | Gen:Heur.Zygug.5 |
Sophos | ML/PE-A |
Comodo | TrojWare.Win32.Injector.ADKK@4vyrc7 |
F-Secure | Trojan.TR/Dropper.VB.Gen |
DrWeb | Trojan.PWS.SpySweep.389 |
Zillya | Trojan.Genome.Win32.222629 |
McAfee-GW-Edition | BehavesLike.Win32.PWSZbot.hc |
Emsisoft | Gen:Heur.Zygug.5 (B) |
Ikarus | Trojan.Win32.Injector |
Avira | TR/Dropper.VB.Gen |
MAX | malware (ai score=85) |
Antiy-AVL | Trojan/Win32.Unknown |
Kingsoft | Win32.Troj.Genome.(kcloud) |
Microsoft | TrojanDownloader:Win32/Dofoil.R |
Arcabit | Trojan.Zygug.5 |
AhnLab-V3 | Spyware/Win32.Zbot.R53905 |
ZoneAlarm | Trojan-Downloader.Win32.Dofoil.bvwc |
GData | Gen:Heur.Zygug.5 |
Cynet | Malicious (score: 100) |
VBA32 | TScope.Trojan.VB |
Malwarebytes | Malware.AI.94428479 |
Panda | Trj/CI.A |
Tencent | Win32.Trojan.Genome.Swku |
Yandex | Trojan.GenAsa!jQV7+jH/uYM |
SentinelOne | Static AI – Malicious PE |
eGambit | Generic.Malware |
Fortinet | W32/Injector.ACPT!tr |
AVG | Win32:Malware-gen |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_60% (D) |
Qihoo-360 | HEUR/Malware.QVM03.Gen |
How to remove TrojanDownloader:Win32/Dofoil.R?
- Download and install GridinSoft Anti-Malware.
- Open GridinSoft Anti-Malware and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Select proper browser and options – Click “Reset”.
- Restart your computer.
Leave a Comment