Ransom

ML/PE-A + Mal/Ransom-FN (file analysis)

Malware Removal

The ML/PE-A + Mal/Ransom-FN is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Mal/Ransom-FN virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • Unconventionial language used in binary resources: Spanish (Guatemala)
  • The binary likely contains encrypted or compressed data.
  • Executed a process and injected code into it, probably while unpacking
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Creates a copy of itself
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

How to determine ML/PE-A + Mal/Ransom-FN?


File Info:

crc32: 2096DEF3
md5: b91a0c1f00ff91ab471eeaa1236e4585
name: B91A0C1F00FF91AB471EEAA1236E4585.mlw
sha1: a737c468adcaf937c52c8c0bcbf160c1a0ee56d9
sha256: 514350dcb753d8069e4904d881d731c90b45975fecd1bab4c18688d487e7ee6c
sha512: 259df69517574e9eb021b4e3625c27570722990bd29c7ba9f48dcd35ccfc6e37faeef2fd16a0c3938fc093a87b09847d2d7e79245f2eb3adaa2b824e1f0ce11a
ssdeep: 6144:AtzWC4lXhUfESg/Qy+K3elo5jGZJDVL38MME:AtzvODfelqUD3ME
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

ML/PE-A + Mal/Ransom-FN also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Panda.11620
MicroWorld-eScanTrojan.BRMon.Gen.4
FireEyeGeneric.mg.b91a0c1f00ff91ab
CAT-QuickHealTrojan.Chapak.ZZ5
Qihoo-360Win32/Trojan.7fd
ALYacTrojan.BRMon.Gen.4
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0053305e1 )
BitDefenderTrojan.BRMon.Gen.4
K7GWTrojan ( 00520df91 )
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderThetaGen:NN.ZexaF.34590.suW@aedUgx6
SymantecPacked.Generic.525
APEXMalicious
AvastFileRepMalware
ClamAVWin.Packer.Crypter-6539596-1
KasperskyHEUR:Trojan.Win32.Generic
NANO-AntivirusTrojan.Win32.Panda.eyysin
AegisLabTrojan.Win32.Generic.4!c
Ad-AwareTrojan.BRMon.Gen.4
EmsisoftTrojan.BRMon.Gen.4 (B)
ComodoTrojWare.Win32.Crypt.BF@7gchou
F-SecureHeuristic.HEUR/AGEN.1106539
TrendMicroRansom_HPGANDCRAB.SMG2
McAfee-GW-EditionBehavesLike.Win32.Generic.dc
SophosML/PE-A + Mal/Ransom-FN
IkarusTrojan.Win32.Danabot
JiangminTrojanSpy.Panda.df
AviraHEUR/AGEN.1106539
Antiy-AVLTrojan/Win32.AGeneric
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftRansom:Win32/Gandcrab.SF!MTB
ArcabitTrojan.BRMon.Gen.4
SUPERAntiSpywareTrojan.Agent/Gen-Kryptik
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataTrojan.BRMon.Gen.4
CynetMalicious (score: 100)
AhnLab-V3Win-Trojan/MalPe34.Suspicious.X2029
Acronissuspicious
McAfeeGenericRXDP-BY!B91A0C1F00FF
MAXmalware (ai score=99)
VBA32Trojan-Ransom.Blocker
MalwarebytesTrojan.MalPack
PandaTrj/CI.A
ESET-NOD32a variant of Win32/Kryptik.GARU
TrendMicro-HouseCallRansom_HPGANDCRAB.SMG2
RisingMalware.Obscure/Heur!1.A89E (CLOUD)
YandexTrojan.GenAsa!IArgMHJ80pw
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_97%
FortinetW32/Kryptik.GMUU!tr
AVGFileRepMalware
Cybereasonmalicious.f00ff9
Paloaltogeneric.ml
MaxSecureRansomeware.CRAB.gen

How to remove ML/PE-A + Mal/Ransom-FN?

ML/PE-A + Mal/Ransom-FN removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment