Malware

What is “Win32/Injector.MFA”?

Malware Removal

The Win32/Injector.MFA is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Injector.MFA virus can do?

  • Sample contains Overlay data
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • CAPE detected the embedded win api malware family
  • Anomalous binary characteristics
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Win32/Injector.MFA?


File Info:

name: 8E735221EEBCFF4A112D.mlw
path: /opt/CAPEv2/storage/binaries/9fc41fdacc7b83f2fc0a087ad6f3c16d5c469b3f874c3b10ae2d490484b72e59
crc32: 2EA23D7F
md5: 8e735221eebcff4a112d0d821b3babd6
sha1: bc9e407666089ed99a0cd94ad64b2e53dabca78c
sha256: 9fc41fdacc7b83f2fc0a087ad6f3c16d5c469b3f874c3b10ae2d490484b72e59
sha512: 6f7509311c8484bdfc713c32e260c13be6731d6785b3471de73272e5c73979232c1f01d8ff29f1e8ac2880b28f49e084f9db08a18ba38ed146454fd52257205b
ssdeep: 24576:iaS8aLiyd4MFD4Hh1fBTrA2DGQvFjFGHECxduOSEKD4OcNCl7bH6i:SBmy2MqBT82BvVFGHvj3Cl7n
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1F9652321319BC3BBD0B565708E578BF662D3B5A69EBB0603750CE32C2B377E54925382
sha3_384: 3d5b03bbed6f0a7feddd8ba0c8170f747e368d3413fb81daedd5a2823f43716dd1ca0371b2f0621b79260075e33f3144
ep_bytes: 60e8000000005d50510fcaf7d29cf7d2
timestamp: 2012-05-06 11:00:42

Version Info:

Comments:
CompanyName: Macromedia
FileDescription:
InternalName: stub32
OriginalFilename: stub32i.exe
FileVersion: 8
LegalCopyright: Copyright ©1997-2005 Macromedia, Inc. and its licensors.
ProductName: Dreamweaver 8
ProductVersion: 8
Translation: 0x0409 0x04b0

Win32/Injector.MFA also known as:

Elasticmalicious (moderate confidence)
ClamAVWin.Trojan.Poison-10007122-0
FireEyeGeneric.mg.8e735221eebcff4a
McAfeeArtemis!8E735221EEBC
Cylanceunsafe
ZillyaTrojan.Agent.Win32.242314
SangforTrojan.Win32.KDV.721063
AlibabaPacked:Win32/CPEX-based.c582813d
K7GWTrojan ( 0055e3991 )
K7AntiVirusTrojan ( 0055e3991 )
ESET-NOD32a variant of Win32/Injector.MFA
APEXMalicious
TrendMicro-HouseCallTSPY_AGENT_CA08031A.TOMC
AvastWin32:Malware-gen
CynetMalicious (score: 99)
KasperskyPacked.Win32.CPEX-based.ht
NANO-AntivirusTrojan.Win32.CPEXbased.bfymbh
TencentWin32.Packed.Cpex-based.Unkl
F-SecureTrojan.TR/Agent.291860
TrendMicroTSPY_AGENT_CA08031A.TOMC
Trapminemalicious.moderate.ml.score
SophosMal/Generic-S
JiangminTrojan/Agent.fzjv
WebrootW32.Malware.Gen
AviraTR/Agent.291860
MAXmalware (ai score=100)
KingsoftWin32.HeurC.KVMH008.a
MicrosoftWorm:Win32/Rebhip.A
XcitiumMalware@#2boaaav4hk20k
ZoneAlarmPacked.Win32.CPEX-based.ht
GoogleDetected
AhnLab-V3Dropper/Win32.Injector.R31219
VBA32Worm.Rebhip
PandaTrj/CI.A
RisingTrojan.Injector!8.C4 (CLOUD)
YandexTrojan.Injector!Buwm8kGA1rQ
IkarusPacker.Win32.CPEX-based
MaxSecurePacked.cpex.based.ht
FortinetW32/Generic.AC.220915!tr
AVGWin32:Malware-gen
alibabacloudVirtool:Win/CPEX-based.ht

How to remove Win32/Injector.MFA?

Win32/Injector.MFA removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment