Malware

UDS:Flooder.Win32.CoreWarrior.a information

Malware Removal

The UDS:Flooder.Win32.CoreWarrior.a is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What UDS:Flooder.Win32.CoreWarrior.a virus can do?

  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Yara detections observed in process dumps, payloads or dropped files

How to determine UDS:Flooder.Win32.CoreWarrior.a?


File Info:

name: 4CFD4A1F3B7D8EAA99F0.mlw
path: /opt/CAPEv2/storage/binaries/ff2168af6539725c6e3c8f31802150018c3f6db6d924537b6d3807ae3b9b425a
crc32: 055E995C
md5: 4cfd4a1f3b7d8eaa99f0ee537b524934
sha1: f97cc324bb42ea777ee3071adffaffeeca7a51b0
sha256: ff2168af6539725c6e3c8f31802150018c3f6db6d924537b6d3807ae3b9b425a
sha512: ee9db294ac242ca8efd57292ee27d04d79ee8267f60a563ce28710e1a8a623d5503531b31d28ff7d77cde9e44b74309ee472afa6159ad7c3b59e74a32f81b751
ssdeep: 1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+IK:LJ0TAz6Mte4A+aaZx8EnCGVuI
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T15283021646DF58F7E4AB027D469D9063B2FBA06F4BCE3EDBE1FC224DD6162B01580248
sha3_384: 39fe7e3bcf6113eef9f54875b4e016f38eb2e92db576b8f963ebe5a9f008b75300760b5b3dad0a07a8734d9fb808fec4
ep_bytes: 60be154041008dbeebcffeff5783cdff
timestamp: 2014-07-01 18:02:13

Version Info:

0: [No Data]

UDS:Flooder.Win32.CoreWarrior.a also known as:

BkavW32.AIDetectMalware
LionicHacktool.Win32.Snojan.3!c
MicroWorld-eScanApplication.Agent.BPO
FireEyeApplication.Agent.BPO
SkyhighBehavesLike.Win32.BadFile.mc
McAfeeArtemis!4CFD4A1F3B7D
Cylanceunsafe
SangforTrojan.Win32.Agent.Vbca
K7AntiVirusTrojan ( 00575d031 )
AlibabaTrojanDownloader:Win32/CoreWarrior.49a4c46c
K7GWTrojan ( 00575d031 )
Cybereasonmalicious.f3b7d8
SymantecTrojan.Gen.MBT
Elasticmalicious (moderate confidence)
ESET-NOD32a variant of Win32/Agent.AAEF
TrendMicro-HouseCallTROJ_GEN.R002C0DD524
ClamAVWin.Malware.Cymt-10023133-0
KasperskyUDS:Flooder.Win32.CoreWarrior.a
BitDefenderApplication.Agent.BPO
NANO-AntivirusTrojan.Win32.Snojan.jqzopm
AvastWin32:Banker-LAA [Trj]
TencentMalware.Win32.Gencirc.10bfcc8f
EmsisoftApplication.Agent.BPO (B)
F-SecureTrojan.TR/Crypt.ULPM.Gen2
DrWebTool.Snojan.1
VIPREApplication.Agent.BPO
Trapminesuspicious.low.ml.score
SophosTroj/Bdoor-BHD
SentinelOneStatic AI – Suspicious PE
JiangminDownloader.Snojan.adp
GoogleDetected
AviraTR/Crypt.ULPM.Gen2
Antiy-AVLHackTool[Flooder]/Win32.CoreWarrior
MicrosoftTrojanDownloader:Win32/Nemucod
XcitiumTrojWare.Win32.Snojan.B@7h1cjp
ArcabitApplication.Agent.BPO
ZoneAlarmVHO:Flooder.Win32.CoreWarrior.gen
GDataWin32.Application.Snojan.A
CynetMalicious (score: 100)
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36802.fmGfaC@Dadi
ALYacApplication.Agent.BPO
MAXmalware (ai score=76)
VBA32Flooder.CoreWarrior
MalwarebytesGeneric.Malware/Suspicious
PandaTrj/Genetic.gen
RisingDownloader.Snojan!8.ECDD (TFE:5:V47YrAkOYKG)
YandexTrojan.GenAsa!+IN19GpQULE
IkarusTrojan.SuspectCRC
MaxSecureTrojan.Malware.300983.susgen
FortinetRiskware/Snojan
AVGWin32:Banker-LAA [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_60% (D)
alibabacloudTrojan[downloader]:Win/Nemucod

How to remove UDS:Flooder.Win32.CoreWarrior.a?

UDS:Flooder.Win32.CoreWarrior.a removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment