Malware

ML/PE-A + Mal/Urelas-G removal

Malware Removal

The ML/PE-A + Mal/Urelas-G is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Mal/Urelas-G virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Attempts to connect to a dead IP:Port (2 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Korean
  • The binary contains an unknown PE section name indicative of packing
  • Executable file is packed/obfuscated with MPRESS
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • A process attempted to delay the analysis task by a long amount of time.
  • Created a process from a suspicious location
  • Anomalous binary characteristics

How to determine ML/PE-A + Mal/Urelas-G?


File Info:

name: C4DDD2E147ED72AEB6D8.mlw
path: /opt/CAPEv2/storage/binaries/8499736211a53dbaa12f2c95d25eceac42a2eae870fee0a3a0a24886613515aa
crc32: EEB131A1
md5: c4ddd2e147ed72aeb6d8ce67fe92cc90
sha1: dac7efcc63f1b3efb2a6972d36243ed0dd3ae5fe
sha256: 8499736211a53dbaa12f2c95d25eceac42a2eae870fee0a3a0a24886613515aa
sha512: 82eac6e9cada6ddab9fcabbdbcd17ed28d40b24967486467c84b28fae745aa7773ccb5159c1b0b90a3fe48a66d45df429d2eacd7010f3a05894b2aef5ab1f2d5
ssdeep: 12288:iwCXnLquXU99ICQj7xrcqPkePh+RvMaBlYJQCe2m9Or:ZFn9pQjFMePh+RpBlU69Or
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14CB5DF2D7A4C9071E7A90B714832E6B50D696C3906A4A5CFF7783E3A5D312D3867328F
sha3_384: 5fb73443286cf9d46b66d02031782bdc0a761692245ac737713ac491711af0a6f82e4ade54629fe0c447b4a59be87106
ep_bytes: e8b0750000e979feffff8bff558bec81
timestamp: 2012-11-09 07:14:38

Version Info:

CompanyName: Apple
FileDescription: Apple iCloud
FileVersion: 1, 0, 0, 85
InternalName: Apple New Ipad
LegalCopyright: Copyright (C) 2012
OriginalFilename: app stroe
ProductName: Apple iPad
ProductVersion: 1, 0, 0, 85
Translation: 0x0412 0x04b0

ML/PE-A + Mal/Urelas-G also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
DrWebTrojan.AVKill.25437
MicroWorld-eScanTrojan.GenericKD.48008965
FireEyeGeneric.mg.c4ddd2e147ed72ae
CAT-QuickHealTrojan.Swisyn.16719
McAfeeTrojan-FCSU!C4DDD2E147ED
CylanceUnsafe
VIPRETrojan.Win32.Urelas.b (v)
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0052964f1 )
BitDefenderTrojan.GenericKD.48008965
K7GWTrojan ( 0052964f1 )
Cybereasonmalicious.147ed7
BitDefenderThetaGen:NN.ZexaF.34182.os3@amIwcMeO
VirITTrojan.Win32.Generic.CDAZ
CyrenW32/Plite.C.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Urelas.AR
APEXMalicious
ClamAVWin.Trojan.R-102
KasperskyRootkit.Win32.Plite.pvf
NANO-AntivirusTrojan.Win32.Plite.crinlj
SUPERAntiSpywareTrojan.Agent/Gen-Dropper
RisingRootkit.Plite!8.BC7 (TFE:dGZlOgWqOROT1pUHkA)
SophosML/PE-A + Mal/Urelas-G
ComodoTrojWare.Win32.GupBoot.BFC@5szi8p
BaiduWin32.Rootkit.Agent.s
ZillyaTrojan.Urelas.Win32.447
McAfee-GW-EditionBehavesLike.Win32.CoinMiner.vz
EmsisoftTrojan.GenericKD.48008965 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan/Generic.aoxdt
AviraTR/Crypt.XPACK.Gen2
MAXmalware (ai score=86)
Antiy-AVLTrojan/Generic.ASMalwS.2C41F5
MicrosoftTrojan:Win32/Gupboot.B
ZoneAlarmRootkit.Win32.Plite.pvf
GDataWin32.Trojan.PSE.1HZEHYG
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Wecod.R41369
VBA32Trojan.Packed
ALYacTrojan.GenericKD.48008965
MalwarebytesMalware.AI.3013712172
PandaTrj/Genetic.gen
TencentTrojan.Win32.Agent.afj
YandexRootkit.Plite!8zR4vrnyExI
IkarusTrojan.Win32.Urelas
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Urelas.O!tr
AVGMBR:Plite-G [Rtk]
AvastMBR:Plite-G [Rtk]
CrowdStrikewin/malicious_confidence_70% (D)

How to remove ML/PE-A + Mal/Urelas-G?

ML/PE-A + Mal/Urelas-G removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment