Trojan

UDS:Trojan.Win32.Vehidis malicious file

Malware Removal

The UDS:Trojan.Win32.Vehidis is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What UDS:Trojan.Win32.Vehidis virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Drops a binary and executes it
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Creates a hidden or system file
  • Creates a copy of itself
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

yk.sk5ds.cn

How to determine UDS:Trojan.Win32.Vehidis?


File Info:

crc32: C8CCADA2
md5: 14165b2ea8c7988d6a746f2ff7ccda4b
name: 14165B2EA8C7988D6A746F2FF7CCDA4B.mlw
sha1: 7db3e4936b215a9ade80f9b9603812f301843fab
sha256: 491405e850acaea346da352e0c43f8dbff0736aedc0695b56d4c99947a4a601e
sha512: 9ac43bc1d3f4105265f1f1eb94abab632f5a168f35ce759eb1a4ead4603b030ba4a1c7836a3fbdeeebcd11b000c591a6ec85ee8568f1db69d7d9cc82a96f7a5d
ssdeep: 6144:+pos5+oHTlfsuK1i3bXGRIp37RnUQ7kIQqlSOboBWBzijVpOpF08pTMv5HI00:+eM+SERubWC3RN7wgS9BWBzAmJpTEo
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: x7248x6743x6240x6709 (C) 2001
InternalName: XPButtonDemo
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: XPButtonDemo x5e94x7528x7a0bx5e8f
ProductVersion: 1, 0, 0, 1
FileDescription: XPButtonDemo Microsoft x57fax7840x7c7bx5e94x7528x7a0bx5e8f
OriginalFilename: XPButtonDemo.EXE
Translation: 0x0804 0x04b0

UDS:Trojan.Win32.Vehidis also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 005657321 )
Elasticmalicious (high confidence)
DrWebTrojan.DownLoader33.51294
ClamAVWin.Dropper.Gh0stRAT-9189464-0
ALYacGen:Variant.Graftor.714926
MalwarebytesGeneric.Trojan.Malicious.DDS
ZillyaTrojan.Kryptik.Win32.2054207
CrowdStrikewin/malicious_confidence_100% (W)
K7GWTrojan ( 005657321 )
Cybereasonmalicious.ea8c79
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HCXA
APEXMalicious
AvastWin32:Trojan-gen
CynetMalicious (score: 100)
KasperskyUDS:Trojan.Win32.Vehidis.gen
BitDefenderGen:Variant.Graftor.714926
MicroWorld-eScanGen:Variant.Graftor.714926
Ad-AwareGen:Variant.Graftor.714926
SophosML/PE-A + Troj/AutoG-ID
BitDefenderThetaGen:NN.ZexaF.34170.Bq0@aipy8dmb
McAfee-GW-EditionBehavesLike.Win32.Emotet.gc
FireEyeGeneric.mg.14165b2ea8c7988d
EmsisoftGen:Variant.Graftor.714926 (B)
SentinelOneStatic AI – Malicious PE
JiangminBackdoor.Farfli.doh
Antiy-AVLTrojan/Generic.ASMalwS.3085FE9
MicrosoftBackdoor:Win32/Zegost.KM!MTB
ArcabitTrojan.Graftor.DAE8AE
GDataGen:Variant.Graftor.714926
AhnLab-V3Malware/Win32.RL_Generic.R369244
Acronissuspicious
McAfeePUP-XLE-XL
MAXmalware (ai score=84)
VBA32BScope.Backdoor.Farfli
TrendMicro-HouseCallTROJ_GEN.R005C0DIQ21
RisingTrojan.Kryptik!1.D241 (CLASSIC)
IkarusTrojan.Win32.Krypt
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/GenKryptik.EOZH!tr
AVGWin32:Trojan-gen

How to remove UDS:Trojan.Win32.Vehidis?

UDS:Trojan.Win32.Vehidis removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment