Worm

Worm.DelfPMF.S30896276 (file analysis)

Malware Removal

The Worm.DelfPMF.S30896276 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Worm.DelfPMF.S30896276 virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Worm.DelfPMF.S30896276?


File Info:

name: D5D2214DA9C4C0B6E3AD.mlw
path: /opt/CAPEv2/storage/binaries/2b2fb22419ce6e5911301a2856e6ea5104966619f8cf462df580549259f57934
crc32: 9D139874
md5: d5d2214da9c4c0b6e3ad37b452c9d2c9
sha1: 1fa4ffc6610379c38c2e61171900f6a42f7d0c85
sha256: 2b2fb22419ce6e5911301a2856e6ea5104966619f8cf462df580549259f57934
sha512: 988f6c0b5f433fab346f07268492c8e5e6781ddcef7a19f4783c7cbe4a538d5f4b2f96cb6714e9fa5c3c7eecc5d8ed764c8197c783bfa55f909f5487977e83b3
ssdeep: 98304:vbGLapIUfkZcx01oq2VjnmlWQtZ/K0tGOFWVRuLftCTl:vbGcISPx01Gn2WyZ/K0ttYVAATl
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T158B66C17F2B841A5D0A6D175CFA28721EB723C598BF096EF214473D92E33AD07A39721
sha3_384: 5aeb51f1a23e0af6d784082f98573f75880e565e5cbfb551d099b76bf949eb1dbca6a63c87509340e53a53db1b17fd7a
ep_bytes: 558bec83c4f0b838464000e874e2ffff
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Worm.DelfPMF.S30896276 also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.Agent.EICV
FireEyeGeneric.mg.d5d2214da9c4c0b6
CAT-QuickHealWorm.DelfPMF.S30896276
SkyhighBehavesLike.Win32.HLLP.vh
ALYacTrojan.Agent.EICV
MalwarebytesGeneric.Malware.AI.DDS
ZillyaWorm.Delf.Win32.3450
SangforSuspicious.Win32.Save.ins
K7AntiVirusTrojan ( 004bcce41 )
K7GWTrojan ( 004bcce41 )
Cybereasonmalicious.661037
ArcabitTrojan.Agent.EICV
BaiduWin32.Virus.Lamer.f
SymantecW32.SillyP2P
Elasticmalicious (moderate confidence)
ESET-NOD32Win32/Delf.NAY
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Virus.Wapomi-9623880-0
KasperskyP2P-Worm.Win32.Delf.aj
BitDefenderTrojan.Agent.EICV
NANO-AntivirusTrojan.Win32.Delf.oxkq
AvastWin32:Delf-SVI [Trj]
TencentVirus.Win32.Lamer.fh
SophosW32/BagarBu-A
F-SecureTrojan.TR/Dropper.Gen
DrWebWin32.HLLW.Kazaa.924
VIPRETrojan.Agent.EICV
TrendMicroTROJ_AGENT_005911.TOMB
Trapminemalicious.high.ml.score
EmsisoftTrojan.Agent.EICV (B)
IkarusWorm.Win32.Eggnog
JiangminWorm/Delf.vm
WebrootW32.Worm.Gen
VaristW32/Aple.A.gen!Eldorado
AviraTR/Dropper.Gen
Antiy-AVLVirus/Win32.BagarBubba.a
XcitiumTrojWare.Win32.Pincav.AV@2rw0ny
MicrosoftWorm:Win32/Xolxo.A
ZoneAlarmP2P-Worm.Win32.Delf.aj
GDataTrojan.Agent.EICV
GoogleDetected
AhnLab-V3Worm/Win32.Delf.R119214
Acronissuspicious
McAfeeW32/HLLP.11042.gen
MAXmalware (ai score=86)
VBA32Worm.Delf
Cylanceunsafe
TrendMicro-HouseCallTROJ_AGENT_005911.TOMB
RisingWorm.P2p.Win32.Delf.bn (CLASSIC)
YandexTrojan.GenAsa!HYSjiRN/8Mk
SentinelOneStatic AI – Malicious PE
MaxSecureVirus.W32.Lamer.FG
FortinetW32/Aple.A
BitDefenderThetaGen:NN.ZelphiF.36792.@pZ@a0C2bxn
AVGWin32:Delf-SVI [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Worm.DelfPMF.S30896276?

Worm.DelfPMF.S30896276 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment