Trojan

UDS:Trojan.Win32.Delf malicious file

Malware Removal

The UDS:Trojan.Win32.Delf is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What UDS:Trojan.Win32.Delf virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Checks for the presence of known windows from debuggers and forensic tools
  • Detects the presence of Wine emulator via registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine UDS:Trojan.Win32.Delf?


File Info:

name: A5268FD853B113BDA2C3.mlw
path: /opt/CAPEv2/storage/binaries/c65c017aff3d1159cc058a0d3aa00548d4bf1a2359bfcdf39dd1ad7f8dcebf72
crc32: F41107CA
md5: a5268fd853b113bda2c3cd1c3132237a
sha1: 317d600b607c69bf7b341120782ca5b8b3ec7ccc
sha256: c65c017aff3d1159cc058a0d3aa00548d4bf1a2359bfcdf39dd1ad7f8dcebf72
sha512: a46aaec7b4e9652c48d8a32705af9ceb4342a9f7726d6c270cd541e2d9df0b0c45fb4073288fbe6f1515146bd369cba325d7671941fd5f34a9523495051771b1
ssdeep: 24576:dUN+/+yNbzwsMI52raZjy97Xea1eBuz9td0tCrjMo2H5JVnACawVHf0NvSjbabPA:ON+/DPMzraFOwR6MpWmQaarh9St
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T151754B95794C62CFD1DE1BB8842BCDC2A45D87BE57644CC3A9287E7B6E22CC211B5C2C
sha3_384: d2346671339819868dca9be96da33891954b97bb06205649e3f44529a613721f3290502828d7c0e2c3e53b3d6bcfec87
ep_bytes: 565053e801000000cc5889c3402d00f0
timestamp: 2023-02-25 19:58:23

Version Info:

0: [No Data]

UDS:Trojan.Win32.Delf also known as:

BkavW32.AIDetectNet.01
LionicTrojan.Win32.Delf.4!c
Elasticmalicious (high confidence)
McAfeeArtemis!A5268FD853B1
Cylanceunsafe
SangforSuspicious.Win32.Save.ins
K7AntiVirusTrojan ( 00587f0f1 )
AlibabaTrojan:Win32/Themida.bde3496e
K7GWTrojan ( 00587f0f1 )
CrowdStrikewin/malicious_confidence_100% (D)
ArcabitTrojan.Generic.D3EA4BB9
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Packed.Themida.HZB
APEXMalicious
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyUDS:Trojan.Win32.Delf.gen
BitDefenderTrojan.GenericKD.65686457
MicroWorld-eScanTrojan.GenericKD.65686457
TencentWin32.Trojan.Delf.Azlw
SophosMal/Generic-S
F-SecureTrojan.TR/Crypt.TPM.Gen
VIPRETrojan.GenericKD.65686457
TrendMicroPAK_Crypt
McAfee-GW-EditionBehavesLike.Win32.Corrupt.th
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.a5268fd853b113bd
EmsisoftTrojan.GenericKD.65686457 (B)
SentinelOneStatic AI – Suspicious PE
AviraTR/Crypt.TPM.Gen
MAXmalware (ai score=81)
Antiy-AVLTrojan[Packed]/Win32.Themida
MicrosoftTrojan:Win32/Wacatac.B!ml
ZoneAlarmUDS:Trojan.Win32.Delf.gen
GDataTrojan.GenericKD.65686457
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36308.KvW@ai3Bnab
ALYacTrojan.GenericKD.65686457
MalwarebytesMalware.Heuristic.1003
ZonerProbably Heur.ExeHeaderL
TrendMicro-HouseCallPAK_Crypt
RisingTrojan.Generic@AI.100 (RDML:4VbL9YDu6RvmY/bAL4fOrw)
MaxSecureTrojan.Malware.1400044.susgen
FortinetPossibleThreat.ZDS
AVGWin32:Trojan-gen
Cybereasonmalicious.b607c6
AvastWin32:Trojan-gen

How to remove UDS:Trojan.Win32.Delf?

UDS:Trojan.Win32.Delf removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment