Malware

Win32/SlhBack.H malicious file

Malware Removal

The Win32/SlhBack.H is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware - Review 2020

GridinSoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend to use GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the TRIAL period.
6-day free trial available.

What Win32/SlhBack.H virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid

How to determine Win32/SlhBack.H?


File Info:

name: 387E6D569DE0F98A5910.mlw
path: /opt/CAPEv2/storage/binaries/bc67ddfa9e50c8f4806235ba4409bd03ba9ec11a419407de15d883c6917a005c
crc32: 09AB322A
md5: 387e6d569de0f98a59102e5833c81d68
sha1: 6ca2c05f91efc778430db702f6cffcd5ef5e3263
sha256: bc67ddfa9e50c8f4806235ba4409bd03ba9ec11a419407de15d883c6917a005c
sha512: 9d45f8b79f6878c566bdffb73a2eef982b2335d0ce777a21268a2f3d8bae65b3b7a20f73551a6a94b80c97cb70f71c4f3f02d4d3f4f81917daf7ee49d8644b96
ssdeep: 12288:fnRrN+VHkWNLLMfcngiHJfA8N6xa34dfsqGg:JYHccgi1A8+gFg
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1FB94236793874F60C08506B4C7A3DF5FE946A58F9CE15E3B6BC5181D7C03A22BA2272D
sha3_384: 626c994e507934c2449c9c4977367b7923f6c74795dd4ef7b902225237bc1097aaf2d6338514b3e8193711aa84ba6928
ep_bytes: 60be156043008dbeebaffcff57eb0b90
timestamp: 1970-01-01 00:00:34

Version Info:

Comments:
CompanyName:
FileDescription:
FileVersion: 1.0.0.0
InternalName:
LegalCopyright:
OriginalFilename:
ProductName:
ProductVersion: 1.0.0.0
Packager: Xenocode Postbuild 2010 for .NET (evaluation)
PackagerVersion: 8.0.1135

Win32/SlhBack.H also known as:

LionicHeuristic.File.Generic.00×1!p
Elasticmalicious (moderate confidence)
MicroWorld-eScanGen:Heur.Codenox.2
McAfeeArtemis!387E6D569DE0
ZillyaTrojan.Refroso.Win32.71525
SangforSuspicious.Win32.Codenox.2
AlibabaTrojan:Win32/Refroso.aef8517e
K7GWTrojan ( 0055e3f01 )
K7AntiVirusTrojan ( 0055e3f01 )
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32Win32/SlhBack.H
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Refroso.bczh
BitDefenderGen:Heur.Codenox.2
NANO-AntivirusTrojan.Win32.Refroso.rbfjk
AvastFileRepMalware [Trj]
TencentWin32.Trojan.Refroso.Psmw
Ad-AwareGen:Heur.Codenox.2
SophosMal/Generic-S
ComodoMalware@#2hrwoesp4e0cl
DrWebTrojan.DownLoader.47650
VIPREGen:Heur.Codenox.2
McAfee-GW-EditionBehavesLike.Win32.Dropper.gc
Trapminemalicious.moderate.ml.score
FireEyeGeneric.mg.387e6d569de0f98a
EmsisoftGen:Heur.Codenox.2 (B)
SentinelOneStatic AI – Suspicious PE
JiangminBackdoor/Poison.dpf
WebrootW32.Trojan.Refroso.bczh
AviraTR/Codenox.sdt
MicrosoftTrojan:Win32/Wacatac.B!ml
ArcabitTrojan.Codenox.2
GDataGen:Heur.Codenox.2
GoogleDetected
AhnLab-V3Trojan/Win32.RL_Generic.R266228
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.34682.zmNfaGINUpgi
ALYacGen:Heur.Codenox.2
VBA32Backdoor.Bifrose
MalwarebytesMalware.Heuristic.1003
RisingTrojan.Refroso!8.256D (CLOUD)
YandexTrojan.XPACK!Ggd6CSjaiAI
IkarusTrojan.Win32.Slhback
FortinetW32/Refroso.BCZH!tr
AVGFileRepMalware [Trj]
Cybereasonmalicious.69de0f
PandaTrj/CI.A

How to remove Win32/SlhBack.H?

Win32/SlhBack.H removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment