EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
|Threat Level:||90 % (High)|
|First Seen:||December 7, 2015|
|Last Seen:||April 8, 2023|
Binuflix is a Trojan-Dropper that may be dispersed among users in ZIP archive files attached to spam email related to political events and news reports. The Binuflix malware can be detected as TrojanDropper:Win32/Binuflix.A and can run on 32-bit and 64-bit Windows systems. The Binuflix trojan-Droppers is similar to Zlob and Kuluoz and may inject code into svchost.exe to hide its activities. Additionally, the TrojanDropper:Win32/Binuflix.A may place DAT libraries and an updater named cppicvk.exe in the Temp directory of Windows to facilitate its covert operations. As its name suggests, TrojanDropper:Win32/Binuflix.A may set up other threats on an infected computer, which may pose an indirect risk of infection with severe cyber threats like Conficker, Bofra and Cidex. All threats mentioned before may be used in a complex attack to collect data like social security numbers, credit card data, login credentials for social media and online banking. The Binuflix Trojan-Dropper may use port 3360 to establish an HTTP connection with its 'Command and Control' servers and download arbitrary code.
The Binuflix Trojan-Dropper might use KV-Server that is a multi-thread Java application to download obfuscated corrupted code on your PC and compile a program's executable. TrojanDropper:Win32/Binuflix.A may reroute its communications through several relays before receiving and sending data to its operators, which may make it hard for security authorities to find its handlers. Additionally, the Binuflix Trojan-Dropper may collect information like your software configuration, IP address, and geographical location to send a detailed report of a successful infiltration to its command servers. The Binuflix Trojan-Dropper should not be underestimated and users who detect TrojanDropper:Win32/Binuflix.A on their PCs should take immediate action. A reputable anti-malware suite can provide the protection you need and purge infections with Binuflix.