Malware

How to remove “ML/PE-A + Mal/EncPk-AEX”?

Malware Removal

The ML/PE-A + Mal/EncPk-AEX is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Mal/EncPk-AEX virus can do?

  • Executable code extraction
  • Injection with CreateRemoteThread in a remote process
  • Attempts to connect to a dead IP:Port (2 unique times)
  • Creates RWX memory
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Sniffs keystrokes
  • A system process is generating network traffic likely as a result of process injection
  • Installs itself for autorun at Windows startup
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Creates a slightly modified copy of itself

Related domains:

nssdc.gsfc.nasa.gov

How to determine ML/PE-A + Mal/EncPk-AEX?


File Info:

crc32: E4ACA85E
md5: ac1dc18af19cb1a464f0cd39770be0ce
name: AC1DC18AF19CB1A464F0CD39770BE0CE.mlw
sha1: c8493899f5faa5a0c22cb3ec0e70424674e56e7a
sha256: 636005e723ba69fc162aaf1ce832ff143441bb5b0fe5961ca027454c3c1a2f34
sha512: 5f525418819f1345f240b0941d586cb5f91836ff217375da57396725bd8857e8d8799fc267810df28254bf2a4da445276a321bad3d17c07413d1003812cb98a6
ssdeep: 6144:1hudYMgjEIj5/JicfxeoZfQ9HAQZAoHR+devHshzxLKemk85us:/KEeXXCePslCk85
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

ML/PE-A + Mal/EncPk-AEX also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 005224381 )
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
ALYacTrojan.Ransom.Cerber.1
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
K7GWTrojan ( 005224381 )
Cybereasonmalicious.af19cb
BaiduWin32.Trojan.Filecoder.q
CyrenW32/Zbot.JC.gen!Eldorado
SymantecPacked.Generic.459
ESET-NOD32a variant of Win32/Kryptik.FZZF
APEXMalicious
AvastWin32:Malware-gen
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Ransom.Cerber.1
NANO-AntivirusTrojan.Win32.Kryptik.evranc
MicroWorld-eScanTrojan.Ransom.Cerber.1
TencentWin32.Trojan.Generic.Lmkr
Ad-AwareTrojan.Ransom.Cerber.1
SophosML/PE-A + Mal/EncPk-AEX
ComodoTrojWare.Win32.Kryptik.ERJ@6l0vie
BitDefenderThetaAI:Packer.7D1B63181E
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_CERBER.SMFE
McAfee-GW-EditionBehavesLike.Win32.Generic.dh
FireEyeGeneric.mg.ac1dc18af19cb1a4
EmsisoftTrojan.Ransom.Cerber.1 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.bsdjm
AviraHEUR/AGEN.1132833
eGambitUnsafe.AI_Score_92%
Antiy-AVLTrojan/Generic.ASMalwS.22CF898
MicrosoftTrojan:Win32/Yakes.DSP!MTB
AegisLabTrojan.Win32.Generic.4!c
GDataTrojan.Ransom.Cerber.1
AhnLab-V3Spyware/Win32.Zbot.C172656
Acronissuspicious
McAfeeArtemis!AC1DC18AF19C
MAXmalware (ai score=100)
VBA32BScope.Trojan.Krilog
MalwarebytesMalware.AI.3973815485
PandaTrj/GdSda.A
TrendMicro-HouseCallRansom_CERBER.SMFE
RisingTrojan.Kryptik!1.AE9C (CLASSIC)
IkarusTrojan.Ransom.Cerber
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Dridex.DD!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove ML/PE-A + Mal/EncPk-AEX?

ML/PE-A + Mal/EncPk-AEX removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment