Malware

ML/PE-A + Mal/Darkeye-C removal

Malware Removal

The ML/PE-A + Mal/Darkeye-C is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Mal/Darkeye-C virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Punjabi
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Created a process from a suspicious location
  • Installs itself for autorun at Windows startup

How to determine ML/PE-A + Mal/Darkeye-C?


File Info:

name: 0AC1E04FD5848263DBC8.mlw
path: /opt/CAPEv2/storage/binaries/661af636d99ce4a057011621c53f051713f579e813b3813c7586a9c1ec23d0f1
crc32: C78B6A76
md5: 0ac1e04fd5848263dbc8c9862dc17fa7
sha1: 26605962dd0f44f4ef287e6557a61027ed58f4bb
sha256: 661af636d99ce4a057011621c53f051713f579e813b3813c7586a9c1ec23d0f1
sha512: 547d5eaaf9fcc89f17fdac740d6d1b301882e6bfbf0d10e01805e609cf5c7593d52fb830fd9dfebe36a926b4117398302c5d2cafd403ee78231b8b9ea25839e5
ssdeep: 3072:Ue2A0wxDqUpM5scww4chO+O1BmP5DG0sg3i4XZ9WvDZHwdRX/L+gP38GA:UsxD5cwohO+O1sVG0/pZ6iPC82
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1706476612899121FF56E32778BC3842BA1C5F1A72533ED16D702DB4A02E2D527BCDB6C
sha3_384: 33802199acde7e51c391b4ef3e65f597519c5d00beba1e3ef680fde80aeb124df1f638714378fec98297a677a375ef5b
ep_bytes: 68ec104000e8f0ffffff000000000000
timestamp: 2012-07-16 19:26:14

Version Info:

Translation: 0x0409 0x04b0
Comments: Ecorchée composta rocker
CompanyName: barbatif lectrifierons
FileDescription: engonce'e cesures participes
LegalCopyright: attesta médiante caoutcho 2000
LegalTrademarks: borderon renifler
ProductName: input e'miettant
FileVersion: 4.02.0006
ProductVersion: 4.02.0006
InternalName: de'cocher
OriginalFilename: de'cocher.exe

ML/PE-A + Mal/Darkeye-C also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Agent.4!c
Elasticmalicious (high confidence)
FireEyeGeneric.mg.0ac1e04fd5848263
ALYacGen:Trojan.Heur3.LPT.sm1@aeYpLYdGb
CylanceUnsafe
ZillyaTrojan.Injector.Win32.386830
SangforTrojan.Win32.Agent.suri
K7AntiVirusRiskware ( 0040eff71 )
AlibabaTrojan:Win32/Injector.e9fe8d8e
K7GWRiskware ( 0040eff71 )
Cybereasonmalicious.fd5848
CyrenW32/A-7518480b!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.UPB
APEXMalicious
Paloaltogeneric.ml
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Agent.suri
BitDefenderGen:Trojan.Heur3.LPT.sm1@aeYpLYdGb
NANO-AntivirusTrojan.Win32.VP.hngcry
MicroWorld-eScanGen:Trojan.Heur3.LPT.sm1@aeYpLYdGb
AvastWin32:Trojan-gen
TencentMalware.Win32.Gencirc.10d014ed
Ad-AwareGen:Trojan.Heur3.LPT.sm1@aeYpLYdGb
EmsisoftGen:Trojan.Heur3.LPT.sm1@aeYpLYdGb (B)
F-SecureTrojan.TR/Dropper.Gen
DrWebTrojan.DownLoader6.14049
TrendMicroTROJ_GEN.R002C0RB822
McAfee-GW-EditionBehavesLike.Win32.Generic.ft
SophosML/PE-A + Mal/Darkeye-C
SentinelOneStatic AI – Malicious PE
GDataGen:Trojan.Heur3.LPT.sm1@aeYpLYdGb
JiangminTrojan/Agent.hisn
AviraTR/Dropper.Gen
MAXmalware (ai score=88)
Antiy-AVLTrojan/Win32.Agent
GridinsoftRansom.Win32.Sabsik.sa
ArcabitTrojan.Heur3.LPT.EBE150
ZoneAlarmTrojan.Win32.Agent.suri
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
AhnLab-V3Trojan/Win.Agent.R469284
Acronissuspicious
McAfeeGenericRXAA-FA!0AC1E04FD584
VBA32Trojan.Agent
MalwarebytesTrojan.Dropper
TrendMicro-HouseCallTROJ_GEN.R002C0RB822
RisingTrojan.Ymacco!8.11BE1 (TFE:4:OBHAEGhPT0F)
IkarusTrojan.Win32.Agent
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/VBKrypt.MBSX!tr
BitDefenderThetaAI:Packer.3508113021
AVGWin32:Trojan-gen
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_100% (W)

How to remove ML/PE-A + Mal/Darkeye-C?

ML/PE-A + Mal/Darkeye-C removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment