Worm

What is “Worm.DelfPMF.S30896276”?

Malware Removal

The Worm.DelfPMF.S30896276 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Worm.DelfPMF.S30896276 virus can do?

  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Worm.DelfPMF.S30896276?


File Info:

name: 2F2417FA2A8E5FB8FB17.mlw
path: /opt/CAPEv2/storage/binaries/0358717dda5cc35236edb2d66c7db82e099bb8f9d431413295a93eb3bd85c1b0
crc32: E8C6E4D4
md5: 2f2417fa2a8e5fb8fb1770939ca5063a
sha1: d07cae760eed6361255afe4ef81f860090422cdf
sha256: 0358717dda5cc35236edb2d66c7db82e099bb8f9d431413295a93eb3bd85c1b0
sha512: e8c90027d07993c8cc065dc8356eae42bef9646fc8a6dbdefe7eae834a53a5ee0f2ea7dd5e701771d9170336b9bd1fd7e83c53524de71f152b69e4fac3368d69
ssdeep: 49152:lRPcOpwxWaeJnlOVDTtQY6SoNtaUJ6fUnHpclbwbWAaJiwmqTjcoT:lGO29eeqqUHxqPFp
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T192A58D03F69511E8D06AC234CB569632EB72BC561B34BAEF0790A2192E77BE05F3D711
sha3_384: 4b9ba0d71f488e19c98b5a1aa6fcb8ddb8344befca067f0c6cc27b18a467bf0f6380d79b404960732397a7da80949779
ep_bytes: 558bec83c4f0b838464000e874e2ffff
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Worm.DelfPMF.S30896276 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Agent.EICV
ClamAVWin.Malware.Delf-6737076-0
CAT-QuickHealWorm.DelfPMF.S30896276
SkyhighBehavesLike.Win32.Dropper.th
McAfeeW32/HLLP.11042.gen
MalwarebytesGeneric.Trojan.Delf.DDS
VIPRETrojan.Agent.EICV
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0053c5661 )
K7GWTrojan ( 0053c5661 )
Cybereasonmalicious.60eed6
BaiduWin32.Virus.Lamer.f
SymantecW32.SillyP2P
tehtrisGeneric.Malware
ESET-NOD32Win32/Delf.NAY
APEXMalicious
CynetMalicious (score: 100)
KasperskyP2P-Worm.Win32.Delf.aj
BitDefenderTrojan.Agent.EICV
NANO-AntivirusTrojan.Win32.Delf.oxkq
AvastWin32:Delf-SVI [Trj]
RisingWorm.P2p.Win32.Delf.bn (CLASSIC)
EmsisoftTrojan.Agent.EICV (B)
F-SecureTrojan.TR/Dropper.Gen
DrWebWin32.HLLW.Kazaa.924
ZillyaWorm.Delf.Win32.3450
TrendMicroTROJ_AGENT_005911.TOMB
FireEyeGeneric.mg.2f2417fa2a8e5fb8
SophosML/PE-A
SentinelOneStatic AI – Malicious PE
GDataTrojan.Agent.EICV
JiangminWorm/Delf.vm
GoogleDetected
AviraTR/Dropper.Gen
MAXmalware (ai score=87)
Antiy-AVLVirus/Win32.BagarBubba.a
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.Pincav.AV@2rw0ny
ArcabitTrojan.Agent.EICV
ZoneAlarmP2P-Worm.Win32.Delf.aj
MicrosoftWorm:Win32/Xolxo.A
VaristW32/Delf.QB.gen!Eldorado
AhnLab-V3Worm/Win32.Delf.R119214
Acronissuspicious
BitDefenderThetaGen:NN.ZelphiF.36680.@nZ@auciUnn
VBA32Worm.Delf
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_AGENT_005911.TOMB
TencentVirus.Win32.Lamer.fh
YandexTrojan.GenAsa!HYSjiRN/8Mk
IkarusTrojan.Agent
MaxSecureVirus.W32.Lamer.FG
FortinetW32/Aple.A
AVGWin32:Delf-SVI [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Worm.DelfPMF.S30896276?

Worm.DelfPMF.S30896276 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment