Malware

Win32/Packed.AutoIt.FR removal guide

Malware Removal

The Win32/Packed.AutoIt.FR is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Packed.AutoIt.FR virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Sniffs keystrokes
  • Behavioural detection: Injection (inter-process)
  • A process attempted to delay the analysis task by a long amount of time.
  • Captures Screenshot
  • Exhibits behavior characteristic of Kibex Spyware/KeyBase Keylogger
  • Installs itself for autorun at Windows startup
  • Installs itself for autorun at Windows startup
  • Attempts to bypass application whitelisting by executing .NET utility in a suspended state, potentially for injection
  • CAPE detected the KeyBase malware family
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Attempts to interact with an Alternate Data Stream (ADS)
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Win32/Packed.AutoIt.FR?


File Info:

name: D9B744716FB50BBFC81A.mlw
path: /opt/CAPEv2/storage/binaries/39e668db9e111ab295ee60974d16382f806b832b30541b83bb9489c32243632e
crc32: E8164A21
md5: d9b744716fb50bbfc81a3e50215c432b
sha1: 6c285a0aa5629b0fd87c870850196392cfb9068d
sha256: 39e668db9e111ab295ee60974d16382f806b832b30541b83bb9489c32243632e
sha512: 535ca640b6eef514f7a635c17c7ae010934db2fcd9e420732c124f8f4ac31962f53cf08641370a0026dd9d24cd05a52d448c246b41e5ac54062289f26140bb44
ssdeep: 24576:jbCj2sObHtqQ4QIYmdEo4MvlHYkU+xma5V7Dgwr/pSiSnYIH7BM7WB:jbCjPKNqQIFIbBMyB
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T133A5D0C6F2EA40E6DC023FF5582467C79B344736473840597BAB3D498F234A9C16ABB6
sha3_384: 3121a36f779a8756785fae8779aadb8a381e7a8952dca2f4debbb48244b28291f04f9e6d88fad4707a100e3dd02ed3c1
ep_bytes: e837c20000e979feffffcccccccccccc
timestamp: 2010-01-15 16:09:54

Version Info:

CompanyName: CHENGDU YIWO Tech Development Co., Ltd
FileDescription: EaseUS Data Recovery Wizard
FileVersion: 9.0.0
InternalName: Data Recovery Wizard
LegalCopyright: Copyright (c) 2004-2015 EaseUS.ALL RIGHTS RESERVED.
OriginalFilename: EaseUS Data Recovery Wizard
ProductName: EaseUS Data Recovery Wizard
ProductVersion: 9.0.0
Translation: 0x0804 0x04b0

Win32/Packed.AutoIt.FR also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Script.Generic.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Siggen17.52162
MicroWorld-eScanTrojan.Agent.BNAA
FireEyeGeneric.mg.d9b744716fb50bbf
ALYacTrojan.Agent.BNAA
MalwarebytesMalware.AI.57817146
VIPRETrojan.Agent.BNAA
K7AntiVirusTrojan ( 004d533f1 )
BitDefenderTrojan.Agent.BNAA
K7GWTrojan ( 004d533f1 )
Cybereasonmalicious.16fb50
CyrenW32/AutoIt.WB.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Packed.AutoIt.FR
TrendMicro-HouseCallTSPY_ATBOT.SMAR5
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Script.Generic
AlibabaTrojan:Win32/Starter.ali2000005
ViRobotTrojan.Win32.Z.Autoit.2198555.BW
AvastWin32:Trojan-gen
Ad-AwareTrojan.Agent.BNAA
TACHYONTrojan/W32.Agent.2198555.C
EmsisoftTrojan.Agent.BNAA (B)
TrendMicroTSPY_ATBOT.SMAR5
McAfee-GW-EditionBehavesLike.Win32.Generic.vm
SophosMal/Generic-R + Troj/Inject-HWO
IkarusTrojan.Win32.Autoit
JiangminTrojan.APosT.axu
AviraHEUR/AGEN.1213924
MicrosoftTrojan:Win32/Skeeyah.A!rfn
ArcabitTrojan.Agent.BNAA
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataTrojan.Agent.BNAA
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Generic.C2533422
McAfeeGenericRXAA-FA!D9B744716FB5
MAXmalware (ai score=84)
APEXMalicious
TencentMalware.Win32.Gencirc.10d0513f
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.7164915.susgen
FortinetAutoIt/Packed.RN!tr
AVGWin32:Trojan-gen
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Win32/Packed.AutoIt.FR?

Win32/Packed.AutoIt.FR removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment