Malware

Win32:Brontok-DF [Wrm] removal instruction

Malware Removal

The Win32:Brontok-DF [Wrm] is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32:Brontok-DF [Wrm] virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Win32:Brontok-DF [Wrm]?


File Info:

name: C222ED9B62282ECFC1FB.mlw
path: /opt/CAPEv2/storage/binaries/87a309c9e530354378e6ad71c2eb5ea0679421e259ada17cbfa32bba17fa1ecc
crc32: 1CF94C3E
md5: c222ed9b62282ecfc1fbab5e0257e362
sha1: e4229371f5bf1a244e277814b13f8a877d0931dd
sha256: 87a309c9e530354378e6ad71c2eb5ea0679421e259ada17cbfa32bba17fa1ecc
sha512: 95593ce5105febd55111f2987fb2ee9a89df97b1ac3d9811abfdb6fe3c7526c723c8557e9dec21ac5b22801ab31c336165fabd29a5e1671c22e3b8085ff3f327
ssdeep: 3072:UVqoCl/YgjxEufVU0TbTyDDalBEGoo6Hk:UsLqdufVUNDa2lk
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C1044B23BE15505FDC2987F19865E63ABA191E3A1BD1BD0732A2FB026471607B9F130F
sha3_384: a902e6efee666f221c89a7c46508bb4ff8c9aa18b687c684baa5b253ee90005be2e3dc9ada6eec892a241ece399bc6fc
ep_bytes: 68dc3a4000e8eeffffff000048000000
timestamp: 2013-04-01 07:08:22

Version Info:

Translation: 0x0409 0x04b0
ProductName: Project1
FileVersion: 1.00
ProductVersion: 1.00
InternalName: TJprojMain
OriginalFilename: TJprojMain.exe

Win32:Brontok-DF [Wrm] also known as:

BkavW32.WatermarkHQc.PE
LionicTrojan.Win32.Agent.tnrh
tehtrisGeneric.Malware
MicroWorld-eScanWin32.Gosys.B
FireEyeGeneric.mg.c222ed9b62282ecf
CAT-QuickHealW32.Mofksys.A4
SkyhighBehavesLike.Win32.Swisyn.ch
McAfeeW32/Swisyn.b
Cylanceunsafe
ZillyaVirus.HLLP.Win32.1
SangforWorm.Win32.Brontok.ulcha
K7AntiVirusVirus ( 00579e181 )
AlibabaWorm:Win32/Mofksys.384
K7GWTrojan ( 0058e74a1 )
Cybereasonmalicious.1f5bf1
ArcabitWin32.Gosys.B
BitDefenderThetaAI:Packer.884CA0651D
VirITTrojan.Win32.Agent4.ALYU
SymantecW32.Gosys
ElasticWindows.Generic.Threat
ESET-NOD32Win32/VB.NBI
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Worm.Brontok-9939288-0
KasperskyVirus.Win32.VB.mz
BitDefenderWin32.Gosys.B
NANO-AntivirusTrojan.Win32.Swisyn.flhacn
AvastWin32:Brontok-DF [Wrm]
TencentWorm.Win32.Wbna.wf
TACHYONWorm/W32.VB-Mofksys.Zen
EmsisoftWin32.Gosys.B (B)
BaiduWin32.Worm.VB.b
F-SecureTrojan.TR/Patched.Ren.Gen
DrWebWin32.HLLP.Swisyn
VIPREWin32.Gosys.B
TrendMicroPE_SWISB.A
Trapminemalicious.high.ml.score
SophosTroj/Agent-ABZF
IkarusWorm.Mofksys
JiangminTrojan/Agent.hxgb
WebrootW32.Malware.Gen
VaristW32/Trojan.UEJO-9077
AviraTR/Patched.Ren.Gen
Antiy-AVLTrojan/Win32.Agent
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.VB.QOTY@4qfd0g
MicrosoftWorm:Win32/Mofksys.RND!MTB
ZoneAlarmVirus.Win32.VB.mz
GDataWin32.Trojan.PSE1.1NLNP9O
GoogleDetected
AhnLab-V3Worm/Win32.Mofksys.R198176
Acronissuspicious
VBA32TScope.Trojan.VB
ALYacWin32.Gosys.B
MAXmalware (ai score=83)
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Spy.AT
ZonerTrojan.Win32.88925
TrendMicro-HouseCallPE_SWISB.A
RisingTrojan.Agent!1.6A70 (CLASSIC)
YandexTrojan.GenAsa!182yZo+3+DM
SentinelOneStatic AI – Malicious PE
MaxSecureVirus.W32.Agent.xjgj
FortinetW32/VB.QCC!tr.dldr
AVGWin32:Brontok-DF [Wrm]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Win32:Brontok-DF [Wrm]?

Win32:Brontok-DF [Wrm] removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment