Trojan

Trojan:Win32/Delf.HH removal instruction

Malware Removal

The Trojan:Win32/Delf.HH is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Delf.HH virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • HTTPS urls from behavior.
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • Executable file is packed/obfuscated with ASPack
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Attempts to modify proxy settings

How to determine Trojan:Win32/Delf.HH?


File Info:

name: 7B2DBFFFE9E40177054F.mlw
path: /opt/CAPEv2/storage/binaries/9e35a754692546af9c2e3262459efdc2e614ce2f367c6f404dad54757904fc5c
crc32: 81DB52C7
md5: 7b2dbfffe9e40177054f78b548d93bfd
sha1: a903d10eb2847d40398c4840cea98d23c250fc75
sha256: 9e35a754692546af9c2e3262459efdc2e614ce2f367c6f404dad54757904fc5c
sha512: 6478099cd1aa0650e3ac82b312b326fda4bd5f08e17706d085cc32d3dbd955fb14dd6fd157b1be3e0ef4ce521b4bdc62ceb22afdf076cbab5dcd7ab9a0d33fb1
ssdeep: 24576:tV7+VYRlLHAy8wxm4BEPvyyIGkdgXNSvauHR:tVmYRlvnxm4BatkWg
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B5153346379A4828E74AC27D29FCD4E4FA64B80B353B292F11E06D35FFEA4118BE114D
sha3_384: 8480e8f8b869005a2379f5da1d6f656bf20a2618f8d3e82f9ab46ea841f0a67950c371c083fbd53966fd925244e83f73
ep_bytes: 60e803000000e9eb045d4555c3e80100
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Trojan:Win32/Delf.HH also known as:

LionicTrojan.Win32.FraudPack.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Barys.305929
ClamAVWin.Trojan.Agent-471004
FireEyeGeneric.mg.7b2dbfffe9e40177
ALYacGen:Variant.Barys.305929
CylanceUnsafe
VIPREGen:Variant.Barys.305929
K7AntiVirusTrojan ( 7000000f1 )
AlibabaBackdoor:Win32/Asper.b1c3b06a
K7GWTrojan ( 7000000f1 )
Cybereasonmalicious.fe9e40
CyrenW32/Risk.AVNW-7205
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/BHO.NYA
APEXMalicious
CynetMalicious (score: 100)
KasperskyBackdoor.Win32.Asper.acgj
BitDefenderGen:Variant.Barys.305929
NANO-AntivirusTrojan.Win32.Agent.bkwqz
AvastFileRepMalware [Trj]
TencentMalware.Win32.Gencirc.10c6e6c4
Ad-AwareGen:Variant.Barys.305929
SophosTroj/Agent-MXB
ComodoMalware@#2e8dnn5uga84t
DrWebBackDoor.Pigeon1.881
ZillyaBackdoor.Hupigon.Win32.80409
TrendMicroTROJ_GEN.R034E01ID13
McAfee-GW-EditionBehavesLike.Win32.Worm.dc
EmsisoftGen:Variant.Barys.305929 (B)
SentinelOneStatic AI – Malicious PE
JiangminBackdoor/Pigeon.i
WebrootW32.Delf.Gen
AviraTR/Drop.Agen.NXK.64
MAXmalware (ai score=100)
MicrosoftTrojan:Win32/Delf.HH
GDataGen:Variant.Barys.305929
GoogleDetected
Acronissuspicious
McAfeeArtemis!7B2DBFFFE9E4
VBA32BScope.Trojan.Wacatac
MalwarebytesMalware.Heuristic.1003
TrendMicro-HouseCallTROJ_GEN.R034E01ID13
RisingTrojan.Win32.Delf.yxc (CLASSIC)
YandexTrojan.GenAsa!WUhcVxjOEcM
IkarusTrojan-Downloader.Win32.Agent
MaxSecureTrojan.Malware.1159834.susgen
FortinetW32/FraudPack.APSH!tr
BitDefenderThetaGen:NN.ZelphiF.34682.5OWbae01hSiP
AVGFileRepMalware [Trj]
PandaGeneric Malware
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Trojan:Win32/Delf.HH?

Trojan:Win32/Delf.HH removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment