Worm

Worm.Win32.Rikihaki.adm removal tips

Malware Removal

The Worm.Win32.Rikihaki.adm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Worm.Win32.Rikihaki.adm virus can do?

  • Sample contains Overlay data
  • Authenticode signature is invalid
  • Installs itself for autorun at Windows startup
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Worm.Win32.Rikihaki.adm?


File Info:

name: 0820DE7602E88C663CDC.mlw
path: /opt/CAPEv2/storage/binaries/4bc857ee19ff3802fe306b05869f2b4c8233df41e55f10cec33873310cacbf22
crc32: F53B314B
md5: 0820de7602e88c663cdc07e3071bfbda
sha1: 144fa9f5938b1c64e77ae9eb0e69a60816473f76
sha256: 4bc857ee19ff3802fe306b05869f2b4c8233df41e55f10cec33873310cacbf22
sha512: 891044f83306346619802c9fdee787392bdfd49fb9b6dc672cf3e97a9fb99fbb84252df75ca874f33062164745cdd58ee96c27b21ceafd6a20fa402f7ed6bcb5
ssdeep: 6144:xNy6C9RyXK7AbehLQq2UM7Je4kv0HO883Si5/0bq:V+hLR2UM7A4S0S3S0/0b
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T11FA47D10F662D035F0A302F68ABA82F4A9347E70077944C7F7D469AE6B696E4ED35703
sha3_384: 8d818d69d2874c89bd8484ca0f7bedb608017f8ac7d50e09dfcaeb8b96f2b5c1757b44609c1a3c4fc861c2fb4ba8b4f2
ep_bytes: 558bece8d82a0100e8030000005dc3cc
timestamp: 2014-06-16 11:09:27

Version Info:

0: [No Data]

Worm.Win32.Rikihaki.adm also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Backdoor.ShadowWali.1
CAT-QuickHealWorm.Rikihaki.A4
ALYacGen:Variant.Backdoor.ShadowWali.1
MalwarebytesGeneric.Malware.AI.DDS
ZillyaWorm.Agent.Win32.109721
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 00023ea01 )
K7GWTrojan ( 00023ea01 )
Cybereasonmalicious.5938b1
BitDefenderThetaAI:Packer.0585414E1F
VirITTrojan.Win32.Agent4.BXTR
CyrenW32/S-4112289e!Eldorado
SymantecTrojan.Tinba
ESET-NOD32Win32/Agent.NPZ
APEXMalicious
CynetMalicious (score: 100)
KasperskyWorm.Win32.Rikihaki.adm
BitDefenderGen:Variant.Backdoor.ShadowWali.1
NANO-AntivirusTrojan.Win32.KillFiles.didhhl
SUPERAntiSpywareTrojan.Agent/Gen-Crypt
AvastWin32:Evo-gen [Trj]
TencentWorm.Win32.Agent.zbi
EmsisoftGen:Variant.Backdoor.ShadowWali.1 (B)
F-SecureHeuristic.HEUR/AGEN.1319328
BaiduWin32.Worm.Agent.fw
VIPREGen:Variant.Backdoor.ShadowWali.1
TrendMicroWORM_RIKIHAKI.SM
McAfee-GW-EditionBehavesLike.Win32.Worm.gh
Trapminesuspicious.low.ml.score
FireEyeGeneric.mg.0820de7602e88c66
SophosMal/Zusy-A
IkarusWorm.Win32.Agent
GDataWin32.Worm.Rikihaki.A
WebrootW32.Malware.gen
AviraHEUR/AGEN.1319328
MAXmalware (ai score=85)
Antiy-AVLWorm/Win32.Rikihaki
XcitiumWorm.Win32.Rikihaki.A@5sbndo
ArcabitTrojan.Backdoor.ShadowWali.1
ZoneAlarmWorm.Win32.Rikihaki.adm
MicrosoftWorm:Win32/Rikihaki.A
GoogleDetected
AhnLab-V3Trojan/Win32.Agent.R148972
Acronissuspicious
McAfeeW32/Worm-FYO!0820DE7602E8
VBA32BScope.Trojan.KillFiles
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallWORM_RIKIHAKI.SM
RisingWorm.Rikihaki!1.A2F0 (CLASSIC)
YandexWorm.Rikihaki!KPeIKXFn2SA
SentinelOneStatic AI – Suspicious PE
MaxSecureTrojan.Malware.8217193.susgen
FortinetW32/Agent.NQD!worm
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Worm.Win32.Rikihaki.adm?

Worm.Win32.Rikihaki.adm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment