Malware

ML/PE-A + Mal/Elenoocka-G removal tips

Malware Removal

The ML/PE-A + Mal/Elenoocka-G is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Mal/Elenoocka-G virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Enumerates services, possibly for anti-virtualization
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Deletes its original binary from disk
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Installs itself for autorun at Windows startup
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • CAPE detected the Tofsee malware family
  • Attempts to interact with an Alternate Data Stream (ADS)
  • Binary compilation timestomping detected
  • Created network traffic indicative of malicious activity
  • Uses suspicious command line tools or Windows utilities

Related domains:

yahoo.com
mail.ru
wpad.local-net
lazystax.ru

How to determine ML/PE-A + Mal/Elenoocka-G?


File Info:

name: 77AA0C76385E39F051B6.mlw
path: /opt/CAPEv2/storage/binaries/6c90806913d83a52e709452cdbedcc2dbc9a7782347a2e6e04cc74dc9ec228cb
crc32: 38E574B8
md5: 77aa0c76385e39f051b64ecd5bcf2c35
sha1: 67593e6c91ac688e38616528e7c21bb660b6ecac
sha256: 6c90806913d83a52e709452cdbedcc2dbc9a7782347a2e6e04cc74dc9ec228cb
sha512: 49e7a79aa3c13ec2d11e06ff2cad7cde6b35cbbbfdd28fd4e2a0529c52960ee872f0b8985091e483b4e103348aed65ec95e4698d266548c81eb4909ebb6b9754
ssdeep: 1536:ukwMn1csF72INm4lC9n8XhyYcDEsD2Y4ICA2weR+WAToBNd28hwdnPO4HAV+uA:ukwOcsUn4dRTcwIdx38cw20wxHf
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16FB6D64BC3106996E9A98377484B9F54BF79F1463A1E6F938720123CEFD2383BD12156
sha3_384: eefc04c1eb11d8efb7ee0bce196dfbf7c1385894f7d4ffce4082160116fb20b529b88a1ad53098d1e168a871a1225ba6
ep_bytes: 5589e56a048d65c0b9c9981500b8fefd
timestamp: 2025-10-03 06:51:47

Version Info:

0: [No Data]

ML/PE-A + Mal/Elenoocka-G also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Mint.Zamg.Q
FireEyeGeneric.mg.77aa0c76385e39f0
ALYacTrojan.Mint.Zamg.Q
CylanceUnsafe
ZillyaBackdoor.Tofsee.Win32.2088
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00540a871 )
AlibabaTrojan:Win32/Kryptik.794d2836
K7GWTrojan ( 00540a871 )
Cybereasonmalicious.6385e3
CyrenW32/S-4060446b!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.GMLE
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Malware.0054085c-6911489-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Mint.Zamg.Q
NANO-AntivirusTrojan.Win32.GenKryptik.fjxpdz
AvastWin32:ReposFxg-F [Trj]
TencentMalware.Win32.Gencirc.10cc6554
Ad-AwareTrojan.Mint.Zamg.Q
EmsisoftTrojan.Mint.Zamg.Q (B)
ComodoBackdoor.Win32.Tofsee.LR@7xg3m7
DrWebTrojan.KillProc.54838
TrendMicroTrojan.Win32.ELENOOKA.SM.hp
McAfee-GW-EditionPacked-FOC!77AA0C76385E
SophosML/PE-A + Mal/Elenoocka-G
IkarusTrojan.Win32.Krypt
GDataTrojan.Mint.Zamg.Q
AviraHEUR/AGEN.1123465
Antiy-AVLTrojan/Generic.ASMalwS.28F594A
GridinsoftRansom.Win32.Sabsik.sa
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
CynetMalicious (score: 100)
AhnLab-V3Backdoor/Win32.Tofsee.R244341
Acronissuspicious
McAfeePacked-FOC!77AA0C76385E
MAXmalware (ai score=88)
VBA32Trojan.Packed
TrendMicro-HouseCallTrojan.Win32.ELENOOKA.SM.hp
RisingTrojan.Generic@ML.100 (RDML:Dss8jHrHWya25JRQWPeMLQ)
YandexTrojan.GenAsa!R2W+7UCliHc
SentinelOneStatic AI – Malicious PE
FortinetW32/Kryptik.GLXU!tr
BitDefenderThetaGen:NN.ZexaF.34294.@tW@aStq!wpi
AVGWin32:ReposFxg-F [Trj]
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_100% (W)
MaxSecureTrojan.Malware.300983.susgen

How to remove ML/PE-A + Mal/Elenoocka-G?

ML/PE-A + Mal/Elenoocka-G removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment