Malware

ML/PE-A + Mal/Tinba-I removal

Malware Removal

The ML/PE-A + Mal/Tinba-I is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Mal/Tinba-I virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Expresses interest in specific running processes
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Tries to unhook or modify Windows functions monitored by Cuckoo

How to determine ML/PE-A + Mal/Tinba-I?


File Info:

name: 9148ADBED38D8112335B.mlw
path: /opt/CAPEv2/storage/binaries/9373eaff20350c13c71e59c12d69c179962aa7c391aede1cab97a267efa4b9de
crc32: 93E75C98
md5: 9148adbed38d8112335b0c74eda55cec
sha1: 21e3c8cc2256709cba294e35b442eeb2b6fc9036
sha256: 9373eaff20350c13c71e59c12d69c179962aa7c391aede1cab97a267efa4b9de
sha512: 9c3712e78cac32a3eca6c66b50bea2158f979db8f5ae4760e24b285759eb099d98605b5fe4c47754b7f03e923181c2b292604cf0d7e0455ea7c365ee369f68ed
ssdeep: 3072:bRwxRv7gKV1W4rIIAF4GGFs9vudNYLWB3HSFd0OW1yWcOiy5dcUa0+06sgE+R:bRUDfXW4ud90NYLWB3HSj0OWQWcOQl5b
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T195142ABDF6A77673C4A60BF687948BE226430D31DB808E53B1D40A0AE73644518EEDF5
sha3_384: cf5f1830288574b1cf64d55e51a5a0954c38f086d5fa2bc93eca4c9c74dc5804ec6c07adf2e306ffa51e27d29d438a50
ep_bytes: 6a706820644200e80202000033db895d
timestamp: 2007-07-28 19:24:42

Version Info:

0: [No Data]

ML/PE-A + Mal/Tinba-I also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Cripack.Gen.1
FireEyeGeneric.mg.9148adbed38d8112
CAT-QuickHealTrojan.Tinba.19898
CylanceUnsafe
ZillyaDropper.Injector.Win32.66699
CrowdStrikewin/malicious_confidence_100% (D)
K7GWRiskware ( 0040eff71 )
K7AntiVirusRiskware ( 0040eff71 )
BitDefenderThetaGen:NN.ZexaF.34294.lmW@aKGskfc
CyrenW32/S-9a74e28b!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Tinba.BE
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Cripack.Gen.1
NANO-AntivirusTrojan.Win32.Inject.dqvidu
AvastWin32:GenMalicious-KOC [Trj]
TencentTrojan.Win32.BitCoinMiner.la
Ad-AwareTrojan.Cripack.Gen.1
SophosML/PE-A + Mal/Tinba-I
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionBehavesLike.Win32.Generic.ch
SentinelOneStatic AI – Malicious PE
EmsisoftTrojan.Cripack.Gen.1 (B)
APEXMalicious
JiangminTrojanDropper.Injector.avvb
WebrootTrojan.Dropper.Gen
AviraHEUR/AGEN.1117952
MAXmalware (ai score=81)
Antiy-AVLTrojan/Generic.ASMalwS.104687D
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
ArcabitTrojan.Cripack.Gen.1
GDataTrojan.Cripack.Gen.1
CynetMalicious (score: 100)
Acronissuspicious
McAfeeObfuscated-FAAH!9148ADBED38D
VBA32BScope.Trojan-Dropper.Inject
MalwarebytesMalware.AI.1893290974
RisingTrojan.Generic@ML.98 (RDML:NA4cn44yl3LNkORRybuwXA)
YandexTrojan.GenAsa!Ad94zd+qofs
IkarusTrojan.Win32.Tinba
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.DHKK!tr
AVGWin32:GenMalicious-KOC [Trj]
Cybereasonmalicious.ed38d8
PandaTrj/Genetic.gen

How to remove ML/PE-A + Mal/Tinba-I?

ML/PE-A + Mal/Tinba-I removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment