In this post, I am going to describe how the Bahamut trojan injected into your personal computer, as well as the best way to get rid of Bahamut trojan virus.
What is Bahamut trojan?
Name | Bahamut |
Infection Type | Trojan |
Symptoms |
|
Similar behavior | Taloc, RuSky, Encoder, Downeks, Morkus, OnionDog |
Fix Tool | See If Your System Has Been Affected by Bahamut trojan |
Trojan viruses are one of the leading malware types by its injection frequency for quite a very long time. And currently, during the pandemic, when malware became significantly active, trojan viruses increased their activity, too. You can see a lot of messages on different resources, where people are complaining concerning the Bahamut trojan virus in their computers, and also asking for aid with Bahamut trojan virus removal.
Trojan Bahamut is a sort of virus that injects into your personal computer, and after that performs various destructive functions. These features rely on a kind of Bahamut trojan: it may function as a downloader for other malware or as a launcher for an additional destructive program which is downloaded along with the Bahamut trojan virus. Over the last two years, trojans are likewise distributed through e-mail attachments, and in the majority of cases used for phishing or ransomware infiltration.
Bahamut2 also known as
Lionic | Trojan.Win32.Convagent.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Graftor.849107 |
ALYac | Gen:Variant.Graftor.849107 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Graftor.849107 |
Sangfor | Trojan.Win32.Agent.Veb4 |
K7AntiVirus | P2PWorm ( 0007622e1 ) |
Alibaba | Trojan:Win32/Bahamut.24f8b901 |
K7GW | P2PWorm ( 0007622e1 ) |
CrowdStrike | win/malicious_confidence_100% (W) |
Cyren | W32/ABRisk.YACJ-4054 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/VB.NYK |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Trojan.Mikey-9958102-0 |
Kaspersky | Trojan.Win32.Bahamut.aj |
BitDefender | Gen:Variant.Graftor.849107 |
NANO-Antivirus | Trojan.Win32.VB.fbgtpu |
Avast | Win32:BackDoor-ACU [Trj] |
Tencent | Malware.Win32.Gencirc.114cfdf1 |
Ad-Aware | Gen:Variant.Graftor.849107 |
Sophos | Mal/Generic-S |
F-Secure | Trojan.TR/Dropper.Gen |
DrWeb | Trojan.DownLoader9.8435 |
Zillya | Trojan.VB.Win32.446334 |
TrendMicro | TROJ_GEN.R002C0WGP22 |
McAfee-GW-Edition | Artemis!Trojan |
Trapmine | suspicious.low.ml.score |
FireEye | Generic.mg.efc9e67b41229d16 |
Emsisoft | Gen:Variant.Graftor.849107 (B) |
SentinelOne | Static AI – Suspicious PE |
GData | Gen:Variant.Graftor.849107 |
Jiangmin | Backdoor/VBbot.ow |
Avira | TR/Dropper.Gen |
MAX | malware (ai score=87) |
Antiy-AVL | Trojan[Backdoor]/Win32.VBbot |
Arcabit | Trojan.Graftor.DCF4D3 |
ViRobot | Trojan.Win32.Z.Graftor.146664 |
ZoneAlarm | Trojan.Win32.Bahamut.aj |
Microsoft | Trojan:Win32/Wacatac.B!ml |
Cynet | Malicious (score: 99) |
McAfee | Artemis!EFC9E67B4122 |
VBA32 | TScope.Trojan.VB |
Malwarebytes | Malware.AI.659684166 |
TrendMicro-HouseCall | TROJ_GEN.R002C0WGP22 |
Rising | Backdoor.VBbot!8.24D6 (CLOUD) |
Yandex | Trojan.GenAsa!1nqj6412xFs |
Ikarus | Trojan.Win32.Turla |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/VB.NOF!tr.spy |
BitDefenderTheta | AI:Packer.1FF809EF20 |
AVG | Win32:BackDoor-ACU [Trj] |
Cybereason | malicious.b41229 |
Panda | Generic Malware |
What are the symptoms of Bahamut trojan?
- Behavioural detection: Executable code extraction – unpacking;
- Attempts to connect to a dead IP:Port (1 unique times);
- Sample contains Overlay data;
- Yara rule detections observed from a process memory dump/dropped files/CAPE;
- Presents an Authenticode digital signature;
- Dynamic (imported) function loading detected;
- Authenticode signature is invalid;
- Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config;
- Installs itself for autorun at Windows startup;
- Anomalous binary characteristics;
The typical indicator of the Bahamut trojan virus is a steady appearance of a wide range of malware – adware, browser hijackers, and so on. As a result of the activity of these harmful programs, your system comes to be really slow: malware absorbs large quantities of RAM and CPU capacities.
An additional visible impact of the Bahamut trojan virus visibility is unknown processes showed in task manager. In some cases, these processes may attempt to simulate system processes, but you can understand that they are not legit by checking out the origin of these processes. Pseudo system applications and Bahamut trojan’s processes are always detailed as a user’s programs, not as a system’s.
How to remove Bahamut trojan virus?
- Download and install Loaris Trojan Remover.
- Open Loaris and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Approve the reset pressing “Yes” button in the appeared window.
- Restart your computer.
To delete Bahamut trojan and also be sure that all extra malware, downloaded with the help of this trojan, will certainly be removed, too, I’d suggest you to use Loaris Trojan Remover.
Bahamut removal guide
To spot and remove all malicious items on your computer using Loaris, it’s better to make use of Standard or Full scan. Removable scan, as well as Custom, will scan only specified directories, so such types of scans cannot provide the full information.
You can spectate the detects till the scan process lasts. Nevertheless, to execute any actions against detected viruses, you need to wait until the process is finished, or to stop the scanning process.
To designate the specific action for each detected malicious items, click the arrow in front of the detection name of detected malicious programs. By default, all malicious items will be sent to quarantine.
How to remove Bahamut Trojan?
Name: Bahamut
Description: Trojan Bahamut is a kind of virus that infiltrates into your computer, and after that performs different destructive functions. These features depend upon a type of Bahamut trojan: it can act as a downloader for many other malware or as a launcher for another destructive program which is downloaded in addition to the Bahamut trojan. During the last two years, trojans are also dispersed via e-mail attachments, and most of situations utilized for phishing or ransomware infiltration.
Operating System: Windows
Application Category: Trojan
User Review
( votes)- What is Trojan Horse: https://en.wikipedia.org/wiki/Trojan_horse_(computing)
- Bahamut VirusTotal Report: https://www.virustotal.com/api/v3/files/4cbac1257f178e8cdc3647f35ea5fb2b036667c0c4705cd5b78c05d3ab3b39c4