Trojan

Win32/TrojanDropper.Delf.OWF removal guide

Malware Removal

The Win32/TrojanDropper.Delf.OWF is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/TrojanDropper.Delf.OWF virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Uses Windows utilities for basic functionality

How to determine Win32/TrojanDropper.Delf.OWF?


File Info:

name: 0A0620657BF716235395.mlw
path: /opt/CAPEv2/storage/binaries/c4ca06766b0b2f5a7aeb24aa39d3b3695bcbe94b96a506dd9950e795064d875c
crc32: 8BB2C74D
md5: 0a0620657bf716235395ef16d2850b6f
sha1: 4bbdaa614ae320486c290596e94bb3a73e1aecec
sha256: c4ca06766b0b2f5a7aeb24aa39d3b3695bcbe94b96a506dd9950e795064d875c
sha512: 3d358902521f442d783a27bd5ae0f64a1965c41ed4be07a8e790687056c8e05456a5c65474803a2664f01c6227d85b0a8e523806e134a1b30099da4463214084
ssdeep: 393216:Z/dQYa0YkCwPQEd83p6wtS1g+3TttRngOq/crzc2:Z/CwCOQEu3pT+3jRngXWz9
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B6F6337BF268A03EC4AA1B3145B3931099776A61681E8C2F53FC394DCF769701E3E616
sha3_384: 2c501ae318950c42c897b477118c0a6a997635dca6f12db8901afc44dbc022b2e8148149c92833ffcb9bc618900dd843
ep_bytes: 558bec83c4a453565733c08945c48945
timestamp: 2021-06-03 08:09:11

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: Adobe Inc
FileDescription: My Adobe System Inc Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: My Adobe System Inc
ProductVersion: 2.9
Translation: 0x0000 0x04b0

Win32/TrojanDropper.Delf.OWF also known as:

LionicTrojan.Win32.Remcos.b!c
MicroWorld-eScanTrojan.GenericKD.38855020
McAfeeArtemis!0A0620657BF7
CylanceUnsafe
SangforTrojan.Win32.Remcos.c
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojanDropper:Win32/Remcos.f0fc8259
K7GWTrojan ( 0058ddb91 )
K7AntiVirusTrojan ( 0058ddb91 )
CyrenW32/Trojan.WPUB-4048
SymantecTrojan.Gen.MBT
ESET-NOD32Win32/TrojanDropper.Delf.OWF
Paloaltogeneric.ml
KasperskyTrojan-Dropper.Win32.Remcos.c
BitDefenderTrojan.GenericKD.38855020
NANO-AntivirusVirus.Win32.Gen.ccmw
AvastWin32:Malware-gen
Ad-AwareTrojan.GenericKD.38855020
DrWebTrojan.MulDrop19.27473
McAfee-GW-EditionArtemis!Trojan
FireEyeTrojan.GenericKD.38855020
EmsisoftMalCert-S.NX (A)
IkarusTrojan.SuspectCRC
WebrootW32.Trojan.Gen
AviraTR/Drop.Remcos.rbpfk
MAXmalware (ai score=88)
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
GridinsoftRansom.Win32.Sabsik.sa
ArcabitTrojan.Generic.D250E16C
GDataTrojan.GenericKD.38855020
ALYacTrojan.GenericKD.38855020
VBA32TrojanDropper.Remcos
MalwarebytesTrojan.Dropper
TrendMicro-HouseCallTROJ_GEN.R002H0CB422
TencentWin32.Trojan-dropper.Remcos.Dus
FortinetW32/PossibleThreat
AVGWin32:Malware-gen
PandaTrj/CI.A

How to remove Win32/TrojanDropper.Delf.OWF?

Win32/TrojanDropper.Delf.OWF removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment