Malware

W32/Xolxo-F removal

Malware Removal

The W32/Xolxo-F is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What W32/Xolxo-F virus can do?

  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Checks for the presence of known devices from debuggers and forensic tools
  • Checks for the presence of known devices from debuggers and forensic tools
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine W32/Xolxo-F?


File Info:

name: 3D30777690EC8BD179B1.mlw
path: /opt/CAPEv2/storage/binaries/5144b4905b0a8cda70db9a3c4a80a8691597761bff176e7a2dbed8e42f5984b8
crc32: F58CFDB8
md5: 3d30777690ec8bd179b177ac15e30345
sha1: 3d359fdc4d6f5c89af5168c6c8e721172175fc0c
sha256: 5144b4905b0a8cda70db9a3c4a80a8691597761bff176e7a2dbed8e42f5984b8
sha512: a20f9c95a425290cd61e8c4caf217242ded1631efe2c12a95c0b7db16444cf35f6af26bd5d6d56fff22cab42c3052d965e414f4aa419be4b6a3e94ef35caf623
ssdeep: 98304:XKU5C/+JOrRYI9urj6KvySznefhv3zV6/J6sV2VW:XKU5CQWRY2/th6/J6sV2VW
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1FF56BF16A6B881F5C073C179C9D39B87FA7134458F349ADF029A922D1F336E19A3E361
sha3_384: 03fdaea2e8101207e9f376b8fac122ca4cab3132a0347b6ca51bb3bae70bf839318fdbb5a9560d5ac48da73c4de0d6e6
ep_bytes: 558bec83c4f0b838464000e874e2ffff
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

W32/Xolxo-F also known as:

BkavW32.AIDetectMalware
LionicVirus.Win32.Lamer.kYNN
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Agent.EICV
CAT-QuickHealWorm.DelfPMF.S30896276
SkyhighBehavesLike.Win32.Generic.tc
McAfeeW32/HLLP.11042.gen
MalwarebytesGeneric.Trojan.Delf.DDS
ZillyaWorm.Delf.Win32.3450
SangforSuspicious.Win32.Save.ins
K7AntiVirusTrojan ( 0053c5661 )
AlibabaWorm:Win32/Xolxo.45b
K7GWTrojan ( 0053c5661 )
Cybereasonmalicious.c4d6f5
ArcabitTrojan.Agent.EICV
BaiduWin32.Virus.Lamer.f
SymantecW32.SillyP2P
tehtrisGeneric.Malware
ESET-NOD32Win32/Delf.NAY
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Virus.Wapomi-9623880-0
KasperskyP2P-Worm.Win32.Delf.aj
BitDefenderTrojan.Agent.EICV
NANO-AntivirusTrojan.Win32.Delf.oxkq
AvastWin32:Delf-SVI [Trj]
TencentVirus.Win32.Lamer.fh
EmsisoftTrojan.Agent.EICV (B)
F-SecureTrojan.TR/Dropper.Gen
DrWebWin32.HLLW.Kazaa.924
VIPRETrojan.Agent.EICV
TrendMicroTROJ_AGENT_005911.TOMB
SophosW32/Xolxo-F
IkarusTrojan.Agent
JiangminWorm/Delf.vm
WebrootW32.Worm.Gen
VaristW32/Delf.QB.gen!Eldorado
AviraTR/Dropper.Gen
Antiy-AVLVirus/Win32.BagarBubba.a
XcitiumTrojWare.Win32.Pincav.AV@2rw0ny
MicrosoftWorm:Win32/Xolxo.A
ZoneAlarmP2P-Worm.Win32.Delf.aj
GDataTrojan.Agent.EICV
GoogleDetected
AhnLab-V3Worm/Win32.Delf.R119214
Acronissuspicious
BitDefenderThetaGen:NN.ZelphiF.36680.@pZ@auciUnn
VBA32Worm.Delf
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_AGENT_005911.TOMB
RisingWorm.P2p.Win32.Delf.bn (CLASSIC)
YandexTrojan.GenAsa!HYSjiRN/8Mk
SentinelOneStatic AI – Malicious PE
MaxSecureVirus.W32.Lamer.FG
FortinetW32/Aple.A
AVGWin32:Delf-SVI [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove W32/Xolxo-F?

W32/Xolxo-F removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment