Spy Trojan

UDS:Trojan-Spy.Win32.Stealer.bbix malicious file

Malware Removal

The UDS:Trojan-Spy.Win32.Stealer.bbix is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What UDS:Trojan-Spy.Win32.Stealer.bbix virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Checks for the presence of known windows from debuggers and forensic tools
  • Created a process from a suspicious location
  • Attempts to disable Windows Defender
  • Attempts to modify Windows Defender using PowerShell
  • Attempts to execute suspicious powershell command arguments

How to determine UDS:Trojan-Spy.Win32.Stealer.bbix?


File Info:

name: 7EE27859025B7348EF4C.mlw
path: /opt/CAPEv2/storage/binaries/3c76ae46eb591cadae7cf4b5050ebd6a89bc6edb44230e483ee1be159077a1c2
crc32: C4ABA5F5
md5: 7ee27859025b7348ef4c63e46e56ae8e
sha1: 504bc4235222df0b9b13a12d0b54732e20639a9e
sha256: 3c76ae46eb591cadae7cf4b5050ebd6a89bc6edb44230e483ee1be159077a1c2
sha512: 630aab6a006ff85b8ff52ab0971477135e6581425810b3bd6aaa140a3043e0f95a492e8cc74a7693b4ab088cbc34b6550ffdb598d862394d28582c3e6b7b2b38
ssdeep: 196608:JisWsIuPy4qgzmHnjtwrEa6pj+Cq1SmlIHa6yrvQfK:JiQy4qgzmHpwrEaqq1Sm2jyrB
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T13A7633C3A43D26A2FC5C0A3762328B5DEA6CF6CE48B6D7975B709D1F4706282B41C25D
sha3_384: 97002557f8d01e429d19e3bfe3f7d928a6fbd527d5a77a57c14a4c04f2c5d9b163bb7b3c703be34baa3b501a8e64fecd
ep_bytes: 81ecd40200005356576a205f33db6801
timestamp: 2020-08-01 02:44:18

Version Info:

0: [No Data]

UDS:Trojan-Spy.Win32.Stealer.bbix also known as:

BkavW32.AIDetect.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Jaik.49613
CAT-QuickHealTrojan.Win64RI.S25839259
ALYacGen:Variant.Jaik.49613
Cybereasonmalicious.9025b7
ArcabitTrojan.Jaik.DC1CD
CyrenW32/Kryptik.GAL.gen!Eldorado
ESET-NOD32multiple detections
APEXMalicious
ClamAVWin.Dropper.Pswtool-9857535-0
KasperskyUDS:Trojan-Spy.Win32.Stealer.bbix
BitDefenderGen:Variant.Jaik.49613
NANO-AntivirusRiskware.Win32.PSWTool.hqsnsl
AvastWin32:Malware-gen
RisingDropper.Agent/NSIS!1.D805 (CLASSIC:cmRtazq4rjrqoauSIrvJisDlZlqW)
SophosTroj/Krypt-FV
ComodoMalware@#23b7zxuguafv4
F-SecureHeuristic.HEUR/AGEN.1208921
BitDefenderThetaGen:NN.ZexaF.34182.Pu3@aCVRCAl
TrendMicroTROJ_FRS.0NA103AV22
McAfee-GW-EditionBehavesLike.Win32.Generic.wc
FireEyeGeneric.mg.7ee27859025b7348
EmsisoftGen:Variant.Jaik.49613 (B)
IkarusTrojan-Spy.Agent
AviraHEUR/AGEN.1144141
MAXmalware (ai score=85)
Antiy-AVLTrojan/Generic.ASMalwS.350E77B
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
ZoneAlarmUDS:Trojan-Spy.Win32.Stealer.bbix
GDataGen:Variant.Jaik.49613
CynetMalicious (score: 100)
VBA32BScope.Exploit.Shellcode
MalwarebytesTrojan.MalPack
TrendMicro-HouseCallTROJ_FRS.0NA103AV22
eGambitUnsafe.AI_Score_99%
FortinetRiskware/Application
AVGWin32:Malware-gen

How to remove UDS:Trojan-Spy.Win32.Stealer.bbix?

UDS:Trojan-Spy.Win32.Stealer.bbix removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment