Malware

How to remove “ML/PE-A + Troj/Agent-BCJD”?

Malware Removal

The ML/PE-A + Troj/Agent-BCJD is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Troj/Agent-BCJD virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid

How to determine ML/PE-A + Troj/Agent-BCJD?


File Info:

name: C5E7774641219BCDD0D2.mlw
path: /opt/CAPEv2/storage/binaries/71178ccaccd6b9fe46da05f54740db899c5519b97b0d97f5689f32cf1885d8de
crc32: C80FC5C2
md5: c5e7774641219bcdd0d2b287cb9e74f0
sha1: c0f368a30cb0d9e396998c718f69f76dbc53388f
sha256: 71178ccaccd6b9fe46da05f54740db899c5519b97b0d97f5689f32cf1885d8de
sha512: ca9fdcacb47e0ed2137cec3cbdf3fbe73157201f121df256723840aa47f28d63cc941435ccbf30b775499ff12bcba6d1ee0d4d6807c0d49cd2799f97b6664113
ssdeep: 3072:PhOm2sI93UufdC67cih3tvn+Yp9gkhqCAmxWJ:Pcm7ImGddXltvnJ9hwJ
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B434C0F11E2CB2D7D1B9E63587909968141293735AC10CE922E857CA0B3CAD2DF8797F
sha3_384: dd2305c5935e0a5af5d5542c8f8201cbc7297bb4eeb520010992a677b6faa638a71c3868e77af31b6fd8faba81ac8adf
ep_bytes: eb03c20c00558bec81ec00100000b800
timestamp: 2015-01-27 03:56:27

Version Info:

0: [No Data]

ML/PE-A + Troj/Agent-BCJD also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Upatre.tomf
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.GenericKD.35932373
CAT-QuickHealTrojan.Wacatac.A2.mue
ALYacTrojan.GenericKD.35932373
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 005722e41 )
BitDefenderTrojan.GenericKD.35932373
K7GWTrojan ( 005722e41 )
Cybereasonmalicious.641219
CyrenW32/S-61f9c7e1!Eldorado
SymantecTrojan Horse
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Packed.BlackMoon.A potentially unwanted
APEXMalicious
ClamAVWin.Malware.Midie-9684412-0
KasperskyHEUR:Trojan.Win32.Generic
AlibabaTrojanDropper:Win32/Yakes.9a9fc2c6
SUPERAntiSpywareTrojan.Agent/Gen-Injector
RisingTrojan.Agent!1.A4D8 (CLOUD)
Ad-AwareTrojan.GenericKD.35932373
EmsisoftTrojan.GenericKD.35932373 (B)
ComodoBackdoor.Win32.Agent.BVX@8hj67l
F-SecureTrojan.TR/Crypt.ZPACK.Gen
DrWebTrojan.Inject1.58305
ZillyaTrojan.AgentGen.Win32.81
FireEyeGeneric.mg.c5e7774641219bcd
SophosML/PE-A + Troj/Agent-BCJD
IkarusTrojan-Dropper.Win32.Dinwod
AviraTR/Crypt.ZPACK.Gen
MAXmalware (ai score=80)
Antiy-AVLGrayWare/Win32.BlackMoon.b
MicrosoftTrojanDropper:Win32/Dinwod
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataWin32.Trojan.BSE.M8YLHM
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.RL_Generic.R286984
Acronissuspicious
McAfeeGenericRXMI-NH!C5E777464121
TACHYONTrojan/W32.Blamon
VBA32Backdoor.Tiny
MalwarebytesGeneric.Trojan.Dropper.DDS
PandaTrj/Genetic.gen
TencentTrojan.Win32.GameteaSpy.a
YandexTrojan.Agent!Nuck9Tuf0wg
SentinelOneStatic AI – Malicious PE
FortinetW32/Injecta.EHCO!tr
BitDefenderThetaGen:NN.ZexaF.34638.oiZ@aSoUSvh
AVGWin32:Injector-CVE [Trj]
AvastWin32:Injector-CVE [Trj]
CrowdStrikewin/malicious_confidence_100% (W)

How to remove ML/PE-A + Troj/Agent-BCJD?

ML/PE-A + Troj/Agent-BCJD removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment