Malware

ML/PE-A + Mal/DotNet-C (file analysis)

Malware Removal

The ML/PE-A + Mal/DotNet-C is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Mal/DotNet-C virus can do?

  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Anomalous .NET characteristics

How to determine ML/PE-A + Mal/DotNet-C?


File Info:

name: 2F0A140892476A2A420E.mlw
path: /opt/CAPEv2/storage/binaries/32a3833628947856ae7ec6f8b97ebc7e1d12884bcbef839b863d6536d7cebc09
crc32: 9ED98196
md5: 2f0a140892476a2a420e25d4bfdbf8b6
sha1: b0c0256d6d824271383f3a7b2a2bffe82f859435
sha256: 32a3833628947856ae7ec6f8b97ebc7e1d12884bcbef839b863d6536d7cebc09
sha512: 080a9fdb6bbe104fa2f8c28c1cb85b722d56049a65149171458cc25fc6fe01cacba06d89786976cfc8f1def6d7de202663fd52c84a6bd5df06356daf8efac0bb
ssdeep: 1536:ScqvaydeqUheXBoITGKROM5UKSjCoebwTf6P:Sc6zeqUhmBoYn5fSjCoebwTw
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19D63C024A2DB9077C4BBC239A95F48140137D372D5EA5A0D3F00CF6E9947E3A79D3AA1
sha3_384: d7ec5eb29eaf4fd12b2857ed07e53f60bb7c2174dd759b52e6e34dac2007ec4bb1fb85e607e0ffd89b4da4970bc1dda7
ep_bytes: ff250020400000000000000000000000
timestamp: 2022-01-16 17:18:38

Version Info:

Translation: 0x0000 0x04b0
CompanyName: Nishant Sivakumar
FileDescription: TypeDescriptionProviderDemo
FileVersion: 5.66.0.7716
InternalName: crypted.exe
LegalCopyright: Copyright © 2008
OriginalFilename: crypted.exe
ProductName: TypeDescriptionProviderDemo
ProductVersion: 5.66.0.7716
Assembly Version: 0.0.0.0

ML/PE-A + Mal/DotNet-C also known as:

LionicTrojan.MSIL.Crysan.m!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.700106
FireEyeGeneric.mg.2f0a140892476a2a
CAT-QuickHealTrojan.Generic.TRFH92
McAfeePWS-FCRS!2F0A14089247
CylanceUnsafe
SangforBackdoor.MSIL.Crysan.gen
K7AntiVirusTrojan ( 004dcb4e1 )
AlibabaTrojan:Win32/Kryptik.ali2000016
K7GWTrojan ( 004dcb4e1 )
Cybereasonmalicious.892476
BitDefenderThetaGen:NN.ZemsilF.34182.em0@aK63oZ
CyrenW32/MSIL_Kryptik.COR.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Kryptik.XBC
Paloaltogeneric.ml
ClamAVWin.Packed.Razy-9863149-0
KasperskyHEUR:Backdoor.MSIL.Crysan.gen
BitDefenderGen:Variant.Razy.700106
AvastWin32:RATX-gen [Trj]
TencentMsil.Backdoor.Crysan.Hrpi
EmsisoftTrojan-Spy.Agent (A)
DrWebTrojan.DownLoader33.58755
McAfee-GW-EditionBehavesLike.Win32.Generic.kc
SophosML/PE-A + Mal/DotNet-C
APEXMalicious
AviraTR/Dropper.MSIL.Gen
MAXmalware (ai score=88)
GridinsoftRansom.Win32.Bladabindi.sa
MicrosoftBackdoor:MSIL/Bladabindi.RKC!MTB
ViRobotTrojan.Win32.Z.Ratx.68096
ZoneAlarmHEUR:Backdoor.MSIL.Crysan.gen
GDataGen:Variant.Razy.700106
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Korat.R341547
ALYacGen:Variant.Razy.700106
MalwarebytesTrojan.MalPack
IkarusTrojan.MSIL.Krypt
RisingMalware.Obfus/MSIL@AI.100 (RDM.MSIL:EiBK6RZ+uekC6uFCgQ7qXA)
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_99%
FortinetMSIL/CoinMiner.ESXT!tr
AVGWin32:RATX-gen [Trj]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_90% (W)

How to remove ML/PE-A + Mal/DotNet-C?

ML/PE-A + Mal/DotNet-C removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment