Malware

ML/PE-A + Troj/Emotet-CLQ (file analysis)

Malware Removal

The ML/PE-A + Troj/Emotet-CLQ is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Troj/Emotet-CLQ virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Expresses interest in specific running processes
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Spoofs its process name and/or associated pathname to appear as a legitimate process
  • Attempts to modify proxy settings
  • Anomalous binary characteristics

How to determine ML/PE-A + Troj/Emotet-CLQ?


File Info:

crc32: B65709B0
md5: 8cf5f0d852e68f4c2c31a4d6b885303f
name: 8CF5F0D852E68F4C2C31A4D6B885303F.mlw
sha1: 1a49f7554729a1c8db992ec6aa9b7fb610332346
sha256: c0924d1e4c9b31cf0a345adacf78128d1a700c33cd60726029df3fb72a1b7749
sha512: 5f0fc8b712984a731ea6525394fab01b5843157adebdb38f8bfdcf9eaf7b086945aec4bdf62bbb83dc0e4f3df8b7ea98f0cdc13c6e857fd8b5a92ca811e7c69d
ssdeep: 6144:wA6gbu5c8hoIaa5fuXiY1n6K6H17YaCbFr1kX4/E9vcBQLYMNIDKWo:9bOc8zaag1nl67y91X/Euw6o
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) 2005
InternalName: PreviewCtrl
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: Anwendung PreviewCtrl
ProductVersion: 1, 0, 0, 1
FileDescription: MFC-Anwendung PreviewCtrl
OriginalFilename: PreviewCtrl.EXE
Translation: 0x0407 0x04b0

ML/PE-A + Troj/Emotet-CLQ also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKDZ.69660
FireEyeGeneric.mg.8cf5f0d852e68f4c
CAT-QuickHealBackdoor.Emotet
ALYacTrojan.GenericKDZ.69660
K7AntiVirusTrojan ( 005600f21 )
BitDefenderTrojan.GenericKDZ.69660
K7GWTrojan ( 005600f21 )
CrowdStrikewin/malicious_confidence_70% (D)
CyrenW32/Emotet.AQS.gen!Eldorado
SymantecTrojan.Emotet
APEXMalicious
AvastWin32:Kryptik-PTA [Trj]
ClamAVWin.Malware.Emotet-9482735-0
KasperskyHEUR:Backdoor.Win32.Emotet.gen
NANO-AntivirusTrojan.Win32.Emotet.hrymjr
ViRobotTrojan.Win32.Emotet.442368.D
RisingTrojan.Kryptik!8.8 (TFE:5:cqpMYSCL1pG)
Ad-AwareTrojan.GenericKDZ.69660
EmsisoftTrojan.Emotet (A)
F-SecureHeuristic.HEUR/AGEN.1138382
DrWebTrojan.Emotet.1003
ZillyaBackdoor.Emotet.Win32.1126
McAfee-GW-EditionBehavesLike.Win32.Emotet.jh
MaxSecureTrojan.Malware.121218.susgen
SophosML/PE-A + Troj/Emotet-CLQ
JiangminBackdoor.Emotet.sh
AviraHEUR/AGEN.1138382
MAXmalware (ai score=80)
Antiy-AVLTrojan[Backdoor]/Win32.Emotet
MicrosoftTrojan:Win32/Emotet.ARJ!MTB
GridinsoftTrojan.Win32.Kryptik.oa!s1
ArcabitTrojan.Generic.D1101C
ZoneAlarmHEUR:Backdoor.Win32.Emotet.gen
GDataTrojan.GenericKDZ.69660
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Emotet.C4185422
McAfeeEmotet-FRV!8CF5F0D852E6
VBA32Backdoor.Emotet
MalwarebytesTrojan.Emotet
ESET-NOD32Win32/Emotet.CD
TencentMalware.Win32.Gencirc.10cdee33
YandexTrojan.Emotet!fqMj+bRKm/I
IkarusTrojan-Banker.Emotet
FortinetW32/Kryptik.HCEJ!tr
AVGWin32:Kryptik-PTA [Trj]
Cybereasonmalicious.852e68

How to remove ML/PE-A + Troj/Emotet-CLQ?

ML/PE-A + Troj/Emotet-CLQ removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment