Malware

About “Win32:Hematite-U [Inf]” infection

Malware Removal

The Win32:Hematite-U [Inf] is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32:Hematite-U [Inf] virus can do?

  • Sample contains Overlay data
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Win32:Hematite-U [Inf]?


File Info:

name: A58E60239BD894E37578.mlw
path: /opt/CAPEv2/storage/binaries/babbb90f70b181944365180903804f19f2bf4ede5ea7e67130a6a22781306bc4
crc32: 581A6C23
md5: a58e60239bd894e37578a6940a681695
sha1: 7ba692125e80ad93d7b3dbe146bbba8134649845
sha256: babbb90f70b181944365180903804f19f2bf4ede5ea7e67130a6a22781306bc4
sha512: 163a0d3f5ac207eeef5aa70793f5110edaa892b552217e6bc05e9864b70406ffd32666ff5481b2c3c3ec7382d07560009d5886a4e33d63978ded171f131ea62e
ssdeep: 384:rrn2TEGlvAc3OON4KcrZwQq0LW2KkN1Q03fC82wMWjqWn:vILl3xN4B/9W2KkN1QcfsuL
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T15F924B2371E1421FE5C721B8C39E2657063BAE04CDDCD79B43966D2209B436BAE35E83
sha3_384: 0505133c7b5327d6bbadf42390e225937dec5f78f018ad209f1ba102e4f6fa3ecd55485af2e30cfb20b854867a52b702
ep_bytes: b8001100002be090be00040001505854
timestamp: 2001-08-17 20:52:51

Version Info:

CompanyName: Microsoft Corporation
FileDescription: File System Conversion Utility
FileVersion: 5.1.2600.0 (xpclient.010817-1148)
InternalName: convert
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFilename: CONVERT.EXE
ProductName: Microsoft® Windows® Operating System
ProductVersion: 5.1.2600.0
Translation: 0x0409 0x04b0

Win32:Hematite-U [Inf] also known as:

BkavW32.AIDetectMalware
AVGWin32:Hematite-U [Inf]
DrWebWin32.Siggen.29
MicroWorld-eScanGen:Trojan.FileInfector.bm1@aa3icCgi
CAT-QuickHealW32.Infector.A5
SkyhighBehavesLike.Win32.HWorld.lm
McAfeeW32/HWorld!A58E60239BD8
VIPREGen:Trojan.FileInfector.bm1@aa3icCgi
SangforSuspicious.Win32.Save.a
K7AntiVirusVirus ( 00508e1d1 )
K7GWVirus ( 00508e1d1 )
Cybereasonmalicious.39bd89
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Agent.NFR
CynetMalicious (score: 100)
APEXMalicious
AvastWin32:Hematite-U [Inf]
ClamAVWin.Dropper.Tufik-6840662-0
BitDefenderGen:Trojan.FileInfector.bm1@aa3icCgi
NANO-AntivirusVirus.Win32.Infector.emtrum
TencentVirus.Win32.Infector.ya
EmsisoftGen:Trojan.FileInfector.bm1@aa3icCgi (B)
F-SecureTrojan.TR/Patched.Gen
BaiduWin32.Trojan.Agent.awj
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.a58e60239bd894e3
SophosW32/HWorld-A
SentinelOneStatic AI – Malicious PE
VaristW32/S-238a4041!Eldorado
AviraTR/Patched.Gen
MAXmalware (ai score=88)
Antiy-AVLVirus/Win32.Infector.gen
MicrosoftVirus:Win32/Hematite.A
XcitiumVirus.Win32.Hematite.A@77ycil
ArcabitTrojan.FileInfector.E1A56C
GDataGen:Trojan.FileInfector.bm1@aa3icCgi
GoogleDetected
AhnLab-V3Virus/Win32.Hematite.R198135
Acronissuspicious
VBA32Virus.Hematite
ALYacGen:Trojan.FileInfector.bm1@aa3icCgi
TACHYONVirus/W32.Hematite
Cylanceunsafe
PandaTrj/Genetic.gen
RisingVirus.Hematite!1.EF53 (CLASSIC)
IkarusVirus.Win32.Agent
MaxSecureVirus.W32.Infector.Gen
FortinetW32/Agent.D17
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)
alibabacloudVirus:Win/HelloWorld.a(dyn)

How to remove Win32:Hematite-U [Inf]?

Win32:Hematite-U [Inf] removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment