Categories: Malware

ML/PE-A + Mal/Elenoocka-G removal tips

The ML/PE-A + Mal/Elenoocka-G is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Mal/Elenoocka-G virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Enumerates services, possibly for anti-virtualization
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Deletes its original binary from disk
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Installs itself for autorun at Windows startup
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • CAPE detected the Tofsee malware family
  • Attempts to interact with an Alternate Data Stream (ADS)
  • Binary compilation timestomping detected
  • Created network traffic indicative of malicious activity
  • Uses suspicious command line tools or Windows utilities

Related domains:

yahoo.com
mail.ru
wpad.local-net
lazystax.ru

How to determine ML/PE-A + Mal/Elenoocka-G?


File Info:

name: 77AA0C76385E39F051B6.mlwpath: /opt/CAPEv2/storage/binaries/6c90806913d83a52e709452cdbedcc2dbc9a7782347a2e6e04cc74dc9ec228cbcrc32: 38E574B8md5: 77aa0c76385e39f051b64ecd5bcf2c35sha1: 67593e6c91ac688e38616528e7c21bb660b6ecacsha256: 6c90806913d83a52e709452cdbedcc2dbc9a7782347a2e6e04cc74dc9ec228cbsha512: 49e7a79aa3c13ec2d11e06ff2cad7cde6b35cbbbfdd28fd4e2a0529c52960ee872f0b8985091e483b4e103348aed65ec95e4698d266548c81eb4909ebb6b9754ssdeep: 1536:ukwMn1csF72INm4lC9n8XhyYcDEsD2Y4ICA2weR+WAToBNd28hwdnPO4HAV+uA:ukwOcsUn4dRTcwIdx38cw20wxHftype: PE32 executable (GUI) Intel 80386, for MS Windowstlsh: T16FB6D64BC3106996E9A98377484B9F54BF79F1463A1E6F938720123CEFD2383BD12156sha3_384: eefc04c1eb11d8efb7ee0bce196dfbf7c1385894f7d4ffce4082160116fb20b529b88a1ad53098d1e168a871a1225ba6ep_bytes: 5589e56a048d65c0b9c9981500b8fefdtimestamp: 2025-10-03 06:51:47

Version Info:

0: [No Data]

ML/PE-A + Mal/Elenoocka-G also known as:

Bkav W32.AIDetect.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.Mint.Zamg.Q
FireEye Generic.mg.77aa0c76385e39f0
ALYac Trojan.Mint.Zamg.Q
Cylance Unsafe
Zillya Backdoor.Tofsee.Win32.2088
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 00540a871 )
Alibaba Trojan:Win32/Kryptik.794d2836
K7GW Trojan ( 00540a871 )
Cybereason malicious.6385e3
Cyren W32/S-4060446b!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.GMLE
APEX Malicious
Paloalto generic.ml
ClamAV Win.Malware.0054085c-6911489-0
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Trojan.Mint.Zamg.Q
NANO-Antivirus Trojan.Win32.GenKryptik.fjxpdz
Avast Win32:ReposFxg-F [Trj]
Tencent Malware.Win32.Gencirc.10cc6554
Ad-Aware Trojan.Mint.Zamg.Q
Emsisoft Trojan.Mint.Zamg.Q (B)
Comodo Backdoor.Win32.Tofsee.LR@7xg3m7
DrWeb Trojan.KillProc.54838
TrendMicro Trojan.Win32.ELENOOKA.SM.hp
McAfee-GW-Edition Packed-FOC!77AA0C76385E
Sophos ML/PE-A + Mal/Elenoocka-G
Ikarus Trojan.Win32.Krypt
GData Trojan.Mint.Zamg.Q
Avira HEUR/AGEN.1123465
Antiy-AVL Trojan/Generic.ASMalwS.28F594A
Gridinsoft Ransom.Win32.Sabsik.sa
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Cynet Malicious (score: 100)
AhnLab-V3 Backdoor/Win32.Tofsee.R244341
Acronis suspicious
McAfee Packed-FOC!77AA0C76385E
MAX malware (ai score=88)
VBA32 Trojan.Packed
TrendMicro-HouseCall Trojan.Win32.ELENOOKA.SM.hp
Rising Trojan.Generic@ML.100 (RDML:Dss8jHrHWya25JRQWPeMLQ)
Yandex Trojan.GenAsa!R2W+7UCliHc
SentinelOne Static AI – Malicious PE
Fortinet W32/Kryptik.GLXU!tr
BitDefenderTheta Gen:NN.ZexaF.34294.@tW@aStq!wpi
AVG Win32:ReposFxg-F [Trj]
Panda Trj/CI.A
CrowdStrike win/malicious_confidence_100% (W)
MaxSecure Trojan.Malware.300983.susgen

How to remove ML/PE-A + Mal/Elenoocka-G?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 months ago