Trojan

Trojan:Win32/Sacto.B!bit removal

Malware Removal

The Trojan:Win32/Sacto.B!bit is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Sacto.B!bit virus can do?

  • A file was accessed within the Public folder.
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Sacto.B!bit?


File Info:

name: F5EED90E60BABBF8D5BF.mlw
path: /opt/CAPEv2/storage/binaries/2190471ae4fe3260f4d48655dca9b2b5d34479cc55feb25cbb879273ffd5234f
crc32: 6010A86B
md5: f5eed90e60babbf8d5bf91db0c69842d
sha1: 04148fc6bbd63f981f999068e0fc6b3226f9d593
sha256: 2190471ae4fe3260f4d48655dca9b2b5d34479cc55feb25cbb879273ffd5234f
sha512: 93ba5c4fa8ae15cdc1600af2c68f1e6c85c3a3414a059121ff1b7ec93eeae0ef32cd902b3c8ac62d7422bd6028ef44f1e65ec9bddcd582872f53674fd402f040
ssdeep: 6144:thYbtlRHxtPABDzxg2s+jhkRFCvfBpTFPgAgnYw:AFHLP6T9jhEFCRp1o
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1BE54E01276C5C8F2D25382310C519B7EE3B6E9300B75CE436B48EB4F1E766529B2A793
sha3_384: cbbec7a442c05e2f255756c9a092efa7a828981c1000fe2bfe893c27f4c8db90e18ad5c886c72b33c7c44b0dcb0d0064
ep_bytes: 558bec6aff6860474100689849400064
timestamp: 2008-12-07 04:12:59

Version Info:

0: [No Data]

Trojan:Win32/Sacto.B!bit also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.FakeFolder.4!c
Elasticmalicious (high confidence)
CynetMalicious (score: 99)
CMCVirus.Win32.Virut.1!O
CAT-QuickHealTrojan.MauvaiseRI.S5250319
ALYacGen:Variant.Zusy.393059
Cylanceunsafe
ZillyaTrojan.FakeFolder.Win32.217
SangforSuspicious.Win32.Save.ins
K7AntiVirusTrojan ( 0054defe1 )
AlibabaWorm:Win32/FakeFolder.7e901647
K7GWTrojan ( 0054defe1 )
Cybereasonmalicious.6bbd63
BitDefenderThetaGen:NN.ZexaF.36662.rqW@ai260Ppj
VirITWin32.Scribble.AB
CyrenW32/Virut.BZ.gen!Eldorado
SymantecSMG.Heur!gen
ESET-NOD32Win32/Agent.NWR
APEXMalicious
ClamAVWin.Malware.Zusy-9957177-0
KasperskyTrojan.Win32.FakeFolder.bk
BitDefenderGen:Variant.Zusy.393059
NANO-AntivirusTrojan.Win32.TrjGen.hmggwe
MicroWorld-eScanGen:Variant.Zusy.393059
AvastWin32:TrojanX-gen [Trj]
TencentMalware.Win32.Gencirc.10be9290
TACHYONTrojan/W32.FakeFolder.288971
EmsisoftGen:Variant.Zusy.393059 (B)
F-SecureHeuristic.HEUR/AGEN.1315328
DrWebTrojan.Siggen7.40939
VIPREGen:Variant.Zusy.393059
TrendMicroTROJ_GEN.R06CC0CIA23
McAfee-GW-EditionBehavesLike.Win32.Generic.dh
FireEyeGeneric.mg.f5eed90e60babbf8
SophosMal/Generic-R
SentinelOneStatic AI – Malicious PE
JiangminTrojan.FakeFolder.a
WebrootW32.Trojan.Gen
AviraHEUR/AGEN.1315328
Antiy-AVLTrojan/Win32.FakeFolder
MicrosoftTrojan:Win32/Sacto.B!bit
XcitiumVirus.Win32.Virut.CE@1fhkga
ArcabitTrojan.Zusy.D5FF63
ZoneAlarmTrojan.Win32.FakeFolder.bk
GDataGen:Variant.Zusy.393059
GoogleDetected
McAfeeGenericRXCG-BI!F5EED90E60BA
MAXmalware (ai score=89)
VBA32Trojan.FakeFolder
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_GEN.R06CC0CIA23
RisingWorm.Agent!8.25 (TFE:5:AafX8HDIoyS)
YandexTrojan.GenAsa!9afgun/ivbg
IkarusWorm.Win32.Agent
MaxSecureTrojan.Malware.10586504.susgen
FortinetW32/Agent.NWR!worm
AVGWin32:TrojanX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan:Win32/Sacto.B!bit?

Trojan:Win32/Sacto.B!bit removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment