Malware

About “Win32/AutoRun.VB.ADA” infection

Malware Removal

The Win32/AutoRun.VB.ADA is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/AutoRun.VB.ADA virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Behavioural detection: Injection (inter-process)
  • CAPE detected the embedded pe malware family
  • Anomalous binary characteristics
  • Attempts to modify Explorer settings to prevent hidden files from being displayed
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Win32/AutoRun.VB.ADA?


File Info:

name: C9A7F200276034894326.mlw
path: /opt/CAPEv2/storage/binaries/fd46f8eede8f7d3c5a3048004887c0e6c5639a1627b7a5bd01f6baf26229621d
crc32: 94D9905D
md5: c9a7f200276034894326045fc6c2ac0c
sha1: d5d470ce7079323cba2e410b618ef6f86e2d70c8
sha256: fd46f8eede8f7d3c5a3048004887c0e6c5639a1627b7a5bd01f6baf26229621d
sha512: 52b2c78239304814c836cdf18ffd38ab161758f4385e85c00cbc169344883375cc0f3864295a852e15a9901818cb6dba27e747f9a21fe41c60c8162c113402ce
ssdeep: 6144:yXIp3oRt36qjyNyRSFKYyNU9t0JT8vKArIydVuw3GX1pv7DaPe+1qOWGMcQ1fXRj:y4St368YWYKYyNUmAv7b4aPb4OWHcQ2
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1E2849941B590E63BE002E4F27955C29B26513D7742A0ACA3BBC50F1B55B02E7BEF0B5B
sha3_384: d55704092710a32b3611e61406435cd219eb4b88b253019cde303f3b5684ed605b3bf8ff5a2362681f90297a736dac26
ep_bytes: 68685e4000e8eeffffff000000000000
timestamp: 2011-03-29 05:37:01

Version Info:

Translation: 0x0409 0x04b0
ProductName: ORncpfnKYEMCswvaTYPvdAVIxc
FileVersion: 1.00
ProductVersion: 1.00
InternalName: KixUOBSrsczXzQ
OriginalFilename: KixUOBSrsczXzQ.exe

Win32/AutoRun.VB.ADA also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.VBKrypt.55
ClamAVWin.Trojan.Changeup-6169544-0
CAT-QuickHealTrojan.Vobfus.gen
SkyhighBehavesLike.Win32.VBObfus.fm
McAfeeDownloader-CJX.gen.z
MalwarebytesGeneric.Malware.AI.DDS
SangforSuspicious.Win32.Save.vb
K7AntiVirusNetWorm ( 700000151 )
K7GWNetWorm ( 700000151 )
Cybereasonmalicious.e70793
BaiduWin32.Worm.Autorun.l
VirITWorm.Win32.WBNA.NL
SymantecW32.Changeup!gen10
ESET-NOD32Win32/AutoRun.VB.ADA
APEXMalicious
CynetMalicious (score: 100)
KasperskyWorm.Win32.WBNA.nl
BitDefenderGen:Variant.VBKrypt.55
NANO-AntivirusTrojan.Win32.WBNA.dxmotm
AvastWin32:VB-SNB [Trj]
TencentWorm.Win32.Wbna.ye
EmsisoftGen:Variant.VBKrypt.55 (B)
F-SecureTrojan:W32/Injector.F
DrWebTrojan.VbCrypt.60
VIPREGen:Variant.VBKrypt.55
TrendMicroWORM_VB.SMXJ
FireEyeGeneric.mg.c9a7f20027603489
SophosMal/SillyFDC-M
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.VBKrypt.55
GoogleDetected
AviraTR/Dropper.Gen
MAXmalware (ai score=83)
Antiy-AVLWorm/Win32.WBNA.gen
ArcabitTrojan.VBKrypt.55
ViRobotWorm.Win32.A.WBNA.405504
ZoneAlarmWorm.Win32.WBNA.nl
MicrosoftWorm:Win32/Vobfus!pz
VaristW32/Vobfus.P.gen!Eldorado
AhnLab-V3Trojan/Win32.Tdss.R7739
Acronissuspicious
VBA32BScope.Worm.WBNA
ALYacGen:Variant.VBKrypt.55
TACHYONWorm/W32.VB-WBNA.405504
Cylanceunsafe
PandaW32/VobfusLNK.A
TrendMicro-HouseCallWORM_VB.SMXJ
RisingTrojan.Win32.VBCode.fld (CLASSIC)
IkarusWorm.Win32.Vobfus
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Generic.AP.1735EB4!tr
BitDefenderThetaAI:Packer.11A8DF1A21
AVGWin32:VB-SNB [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Win32/AutoRun.VB.ADA?

Win32/AutoRun.VB.ADA removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment