Worm

Win32.Worm.Mabezat.C (file analysis)

Malware Removal

The Win32.Worm.Mabezat.C is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32.Worm.Mabezat.C virus can do?

  • Sample contains Overlay data
  • Unconventionial language used in binary resources: Arabic (Saudi Arabia)
  • Authenticode signature is invalid

How to determine Win32.Worm.Mabezat.C?


File Info:

name: BC97EA9121E4179DA7C2.mlw
path: /opt/CAPEv2/storage/binaries/ed8446e065a803c6d91e5024917559f9db30194b7c5c2786ac12ffeb9fe5a2a9
crc32: EC439EED
md5: bc97ea9121e4179da7c284503c38f1a4
sha1: e6ffb525b957924d009bd6ce6942085d1d5e01a9
sha256: ed8446e065a803c6d91e5024917559f9db30194b7c5c2786ac12ffeb9fe5a2a9
sha512: 709915ee642e64ed87f9de583ebd746122f73f1219ecdd033dce0b10bf0d6f0673126b74e7dbc505c2a815fa1fdaf73b72177abe9df1c133116156e1ef790ce9
ssdeep: 1536:IcsE2Z4WvwoZivtxj2C8bZx+EiZQD5IVjkfGXrDkOyxEwJ:YE2KawoZi1xj2C8WFVYO78xx
type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
tlsh: T14673D06A73D8C5B9D797517960931A681AFCEDA06FD90A137F53B21E3D320C96E30203
sha3_384: ec684d45458474c0dae73c332ddcdb7996ebf38dd47efb89e75135c9b9f3d22d7a311e88516d6b4b93732a9c2ed91a99
ep_bytes: ff74240cff74240cff74240ce8140100
timestamp: 2007-10-29 06:16:35

Version Info:

Comments:
CompanyName:
FileDescription:
FileVersion:
InternalName:
LegalCopyright:
LegalTrademarks:
OLESelfRegister:
OriginalFilename:
PrivateBuild:
ProductName:
ProductVersion:
SpecialBuild:
Translation: 0x0409 0x04b0

Win32.Worm.Mabezat.C also known as:

BkavW32.AIDetectMalware
LionicWorm.Win32.Mabezat.lcip
ClamAVWin.Trojan.Mabezat-4
FireEyeGeneric.mg.bc97ea9121e4179d
CAT-QuickHealW32.Mabezat.D5
SkyhighBehavesLike.Win32.Mabezat.lh
ALYacWin32.Worm.Mabezat.C
Cylanceunsafe
ZillyaWorm.Mabezat.Win32.1523
SangforSuspicious.Win32.Save.ins
K7AntiVirusVirus ( 0008d5ef1 )
AlibabaVirus:Win32/Mabezat.9a03fa37
K7GWVirus ( 0008d5ef1 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZedlaF.36802.eu@@ayNBqrfO
VirITWorm.Win32.Mabezat.A
SymantecW32.Mabezat.B
Elasticmalicious (high confidence)
ESET-NOD32Win32/Mabezat.A
APEXMalicious
CynetMalicious (score: 100)
KasperskyWorm.Win32.Mabezat.n
BitDefenderWin32.Worm.Mabezat.C
NANO-AntivirusTrojan.Win32.Mabezat.bvmfa
MicroWorld-eScanWin32.Worm.Mabezat.C
TencentWorm.Win32.Mabezat.a
SophosW32/Mabezat-B
F-SecureWorm.WORM/Mabezat.BA
DrWebWin32.HLLW.Tazebama.59
VIPREWin32.Worm.Mabezat.C
TrendMicroWORM_MABEZAT.AW
EmsisoftWin32.Worm.Mabezat.C (B)
SentinelOneStatic AI – Suspicious PE
JiangminWin32/Mabezat.a
GoogleDetected
AviraWORM/Mabezat.BA
Antiy-AVLWorm/Win32.Mabezat
XcitiumWin32.Mabezat.A@4amr
ArcabitWin32.Worm.Mabezat.C
ViRobotWorm.Win32.A.Mabezat.32768
ZoneAlarmWorm.Win32.Mabezat.n
GDataWin32.Worm.Mabezat.C
VaristW32/Mabezat.UDMW-4166
AhnLab-V3Worm/Win32.Mabezat.R68826
McAfeeW32/Mabezat.dll
MAXmalware (ai score=81)
VBA32Trojan.BHORA.02487
MalwarebytesGeneric.Malware.AI.DDS
PandaW32/Mabezat.C.worm
TrendMicro-HouseCallWORM_MABEZAT.AW
RisingWorm.Win32.Mabezat.b (CLASSIC)
YandexTrojan.GenAsa!w6wllhP9UtM
IkarusWorm.Win32.Mabezat
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Mabezat.B
DeepInstinctMALICIOUS
alibabacloudWorm:Win/Mabezat.38de2be9

How to remove Win32.Worm.Mabezat.C?

Win32.Worm.Mabezat.C removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment