Malware

ML/PE-A + Troj/Agent-BFYM information

Malware Removal

The ML/PE-A + Troj/Agent-BFYM is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Troj/Agent-BFYM virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • A process created a hidden window
  • Performs some HTTP requests
  • The executable is compressed using UPX
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Network activity contains more than one unique useragent.
  • Installs itself for autorun at Windows startup
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Creates a slightly modified copy of itself
  • Collects information to fingerprint the system

Related domains:

pastebin.com
cutit.org
q.gs
aporasal.net

How to determine ML/PE-A + Troj/Agent-BFYM?


File Info:

crc32: 2CAB3DE0
md5: 1acf2ba6f341ec0ddbbcc52f3e8a6436
name: 1ACF2BA6F341EC0DDBBCC52F3E8A6436.mlw
sha1: 916f1f2cfcaf726977bdc3e42a654cf6fc08f5bb
sha256: 78aa88ecf6314b4e76d46b17445a8b5ab9813e06b4b2c526ac1797a81e765412
sha512: bc0a6a3804eae5eb46f0654d97c293b760c0d7e8165fb4be79b5ae129aeecb99526631c2c8456b83c2a6229e43062d6dcc0c0ed871fa33c217007ea752cae154
ssdeep: 24576:sCw3O9heZRDi9St+go65xJbsC7hjJJ1QfAj454x/0J0HXo3H0F:sCw3O9h+RDiIt1oWPsCFjNQfAj3x/0m
type: PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed

Version Info:

0: [No Data]

ML/PE-A + Troj/Agent-BFYM also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.576052
CAT-QuickHealTrojan.Skeeyah
McAfeeGenericRXMZ-EG!1ACF2BA6F341
CylanceUnsafe
VIPREPacker.NSAnti.Gen (v)
SangforMalware
K7AntiVirusTrojan ( 0057372a1 )
BitDefenderGen:Variant.Razy.576052
K7GWTrojan ( 0057372a1 )
Cybereasonmalicious.6f341e
CyrenW32/S-91c2cc44!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:Trojan-gen
KasperskyHEUR:Trojan.Win32.Generic
NANO-AntivirusTrojan.Win32.Razy.iiqrph
Ad-AwareGen:Variant.Razy.576052
SophosML/PE-A + Troj/Agent-BFYM
ComodoPacked.Win32.MUPX.Gen@24tbus
F-SecureHeuristic.HEUR/AGEN.1111440
ZillyaTrojan.Generic.Win32.1283524
TrendMicroPAK_Xed-10
McAfee-GW-EditionBehavesLike.Win32.Generic.dm
FireEyeGeneric.mg.1acf2ba6f341ec0d
EmsisoftGen:Variant.Razy.576052 (B)
IkarusTrojan.Win32.Injector
JiangminTrojan.Injuke.cmg
MaxSecureTrojan.Malware.300983.susgen
AviraHEUR/AGEN.1111440
MAXmalware (ai score=85)
Antiy-AVLTrojan/Win32.Injector
MicrosoftTrojan:Win32/Glupteba!ml
ArcabitTrojan.Razy.D8CA34
ZoneAlarmHEUR:Trojan.Win32.Injuke.vho
GDataGen:Variant.Razy.576052
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R263763
BitDefenderThetaGen:NN.ZexaF.34804.9mZ@aa@cnPk
ALYacGen:Variant.Razy.576052
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.MalPack.UPX
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Injector.EBQH
TrendMicro-HouseCallPAK_Xed-10
RisingTrojan.Injector!1.D070 (CLASSIC)
YandexTrojan.Agent!diVNBg3R0mw
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_97%
FortinetW32/Injector.EBQH!tr
AVGWin32:Trojan-gen
CrowdStrikewin/malicious_confidence_80% (D)
Qihoo-360HEUR/QVM19.1.061F.Malware.Gen

How to remove ML/PE-A + Troj/Agent-BFYM?

ML/PE-A + Troj/Agent-BFYM removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment