Rootkit

What is “Win32/Rootkit.ESPecter.C”?

Malware Removal

The Win32/Rootkit.ESPecter.C is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Rootkit.ESPecter.C virus can do?

  • Presents an Authenticode digital signature
  • Reads data out of its own binary image
  • A process created a hidden window
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Network activity detected but not expressed in API logs
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Win32/Rootkit.ESPecter.C?


File Info:

crc32: CA1C661F
md5: 64e1aa6f5dca669ba51678157058d54b
name: 64E1AA6F5DCA669BA51678157058D54B.mlw
sha1: 9f6df0a011748160b0c18fb2b44ebe9fa9d517e9
sha256: 6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286
sha512: 91f5cc1aba9b26a16e7b9e082c2982f71fe9996be9072f0252a2864894904fec57b65b6d1dae98274df2fe3e4ab4626364040e16802fa5ccf152b71228b54c0d
ssdeep: 1536:esDWvcIU3ayXD1D12E5G9JR0+iGxxUWfdOzq3bdPOoH6LBqtgkdd+4MxUAsKliw:WeayXIJR0hGvTfMwfaLBViYUAzF
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright ? 2012
InternalName: CSignTool
FileVersion: 1, 9, 0, 0
CompanyName: x4e0ax6d77x57dfx8054x8f6fx4ef6x6280x672fx6709x9650x516cx53f8
PrivateBuild:
LegalTrademarks:
Comments:
ProductName: x6570x5b57x7b7ex540dx5de5x5177(x547dx4ee4x884c)
SpecialBuild:
ProductVersion: 1, 0, 0, 0
FileDescription: x6570x5b57x7b7ex540dx5de5x5177(x547dx4ee4x884c)
OriginalFilename: DSignTool
Translation: 0x0804 0x04b0

Win32/Rootkit.ESPecter.C also known as:

BkavW32.AIDetect.malware2
K7AntiVirusRootKit ( 004b169c1 )
LionicTrojan.Win32.Generic.4!c
DrWebTrojan.Siggen6.25619
CynetMalicious (score: 100)
ALYacTrojan.Rootkit.ESPecter
CylanceUnsafe
ZillyaRootkit.Agent.Win32.46110
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaRootkit:Win32/Backboot.4e49963b
K7GWRootKit ( 004b169c1 )
Cybereasonmalicious.011748
ESET-NOD32Win32/Rootkit.ESPecter.C
APEXMalicious
AvastWin32:Malware-gen
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.GenericKD.37727970
NANO-AntivirusTrojan.Win32.Zusy.ffkmmn
MicroWorld-eScanTrojan.GenericKD.37727970
Ad-AwareTrojan.GenericKD.37727970
SophosGeneric ML PUA (PUA)
BitDefenderThetaGen:NN.ZexaF.34170.fq1@aWDRx6hb
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_GEN.R002C0GE321
McAfee-GW-EditionArtemis!Trojan
FireEyeGeneric.mg.64e1aa6f5dca669b
EmsisoftTrojan.GenericKD.37727970 (B)
SentinelOneStatic AI – Suspicious PE
WebrootW32.Rootkit.Gen
KingsoftWin32.Troj.Generic_a.a.(kcloud)
MicrosoftTrojan:Win32/Casdet!rfn
GDataTrojan.GenericKD.37727970
AhnLab-V3Malware/Win32.Generic.C2611965
Acronissuspicious
McAfeeArtemis!64E1AA6F5DCA
MAXmalware (ai score=86)
VBA32BScope.Trojan-Dropper.Tabloid.4
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R002C0GE321
YandexTrojan.GenAsa!kDdiE25Mhhk
IkarusTrojan.SuspectCRC
MaxSecureTrojan.Malware.7164915.susgen
FortinetW32/Rootkit_Agent.NZV!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove Win32/Rootkit.ESPecter.C?

Win32/Rootkit.ESPecter.C removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment