Worm

Worm.Win64.AutoRun.m removal tips

Malware Removal

The Worm.Win64.AutoRun.m is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Worm.Win64.AutoRun.m virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Creates an autorun.inf file
  • Authenticode signature is invalid

Related domains:

ghwUqDz.bitbucket.com
MODh.bitbucket.com
KdQTl.bitbucket.com
xCCUToGJrxwmvE.bitbucket.com
gWMD.bitbucket.com
uLlFg.bitbucket.com
jrpKUhw.bitbucket.com
oGC.bitbucket.com
n73fu7.wayout.pictures
EOYnfGdW.eprGoZBxwYWyLbvqhShK.readme.io
BjmnVTOEnbjOqh.eujkVrZVIXPjrIKfGjlt.readme.io
jqrHbrxgyPCDeH.jgQDVKBUlxKQmyFEiQdQ.readme.io
B.ETggqChZbqomzaqgsIsP.readme.io
j.fFLErBAnhXkJdbSVtvFv.readme.io
NlP.cHjUzsuLjccbjstoWLkF.readme.io
DDnffhCFotaseY.GipGjCVusGmQhQIRjFuo.readme.io
rGcKpHHINGUqE.zlOMwpGZPHSWtXLdKftd.readme.io
codeload.github.com
jbXCWjWiJZaPDd.HtCRzPutuDLiqiUkbCXq.readme.io
JpRWZNEKQSI.SQyyvDDuPGkgFwVlxYop.readme.io
DEaRCMstu.ewwZbMDqfcrhwGpozZXU.readme.io
mega.nz
noscullsnow.com
raw.githubusercontent.com
www.dropbox.com

How to determine Worm.Win64.AutoRun.m?


File Info:

name: 0F1476724C9FB85D6BB4.mlw
path: /opt/CAPEv2/storage/binaries/a01e07eff3303e216214f3a7f0ef60f9651b179148adea807be2f52bf9a82c29
crc32: B3F12F4A
md5: 0f1476724c9fb85d6bb4c64b77226ee3
sha1: 1ee2c9ec29ce152b23f9659b810f6a290e712c1e
sha256: a01e07eff3303e216214f3a7f0ef60f9651b179148adea807be2f52bf9a82c29
sha512: 3ba23ebd702f70faa3a3682eb227eb9bf929cc7c13c3c30a8a6d4f578e8f5ea0034941a30213abd46615c19e78c0ac6383263cbd0824a06b6e47edef3160c75b
ssdeep: 98304:glUTx9Enn+imveujjWjPqZiL2LL0Nyndx0S0J:4n+iQjWLMiKkNq0S0J
type: PE32+ executable (console) x86-64, for MS Windows
tlsh: T109E533569BC088C9F1B7913A0783CC51EE78B1A97B90724E32B3BAE95D0783318B7755
sha3_384: 719c060dc2a6dc07088f46a3c3d113cfb7241c632a7df4c2cc40417d3e30fec63fe3f18f6079df523ac49f7d4cfec54c
ep_bytes: 53565755488d35fa38d2ff488dbedbaf
timestamp: 2019-12-07 10:51:21

Version Info:

0: [No Data]

Worm.Win64.AutoRun.m also known as:

Elasticmalicious (high confidence)
DrWebWin32.HLLO.Siggen.8
MicroWorld-eScanTrojan.GenericKDZ.60758
FireEyeGeneric.mg.0f1476724c9fb85d
ALYacTrojan.GenericKDZ.60758
CylanceUnsafe
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0055e5891 )
K7GWTrojan ( 0055e5891 )
Cybereasonmalicious.24c9fb
BitDefenderThetaGen:NN.ZexaF.34294.luW@aq5RFHdi
CyrenW64/Kryptik.BDT.gen!Eldorado
ESET-NOD32a variant of Win64/Filecoder.A
TrendMicro-HouseCallRansom.Win64.PORNOASSET.SM1.hp
ClamAVWin.Malware.Tofsee-7057860-0
KasperskyWorm.Win64.AutoRun.m
BitDefenderTrojan.GenericKDZ.60758
AvastWin32:ReposFxg-F [Trj]
Ad-AwareTrojan.GenericKDZ.60758
SophosML/PE-A + Mal/HckPk-R
TrendMicroRansom.Win64.PORNOASSET.SM1.hp
McAfee-GW-EditionBehavesLike.Win64.Trickbot.wc
EmsisoftApplication.Miner (A)
IkarusTrojan.LockyC
GDataTrojan.GenericKDZ.60758
MaxSecureTrojan.Malware.121218.susgen
AviraTR/Crypt.ULPM.Gen
Antiy-AVLTrojan/Generic.ASBOL.C626
MicrosoftTrojan:Win32/SmokeLoader
CynetMalicious (score: 100)
AhnLab-V3Win64-Trojan/Pakes.Exp
Acronissuspicious
McAfeeTrickbot-FRE!0F1476724C9F
MAXmalware (ai score=85)
VBA32Trojan.Win64.Pakes
MalwarebytesMalware.AI.1627480902
APEXMalicious
RisingTrojan.Kryptik!1.C31C (CLASSIC)
YandexTrojan.GenAsa!csWrS4OGpG4
SentinelOneStatic AI – Malicious PE
FortinetW64/Kryptik.BTT!tr
AVGWin32:ReposFxg-F [Trj]
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Worm.Win64.AutoRun.m?

Worm.Win64.AutoRun.m removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment