Categories: Malware

ML/PE-A + Troj/Krypt-CK removal guide

The ML/PE-A + Troj/Krypt-CK is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Troj/Krypt-CK virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • A process created a hidden window
  • Drops a binary and executes it
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Slovenian
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Network activity contains more than one unique useragent.
  • Installs itself for autorun at Windows startup
  • Writes a potential ransom message to disk
  • Creates a copy of itself
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

api.2ip.ua
securebiz.org
tbpws.top
dimonbk83.tumblr.com

How to determine ML/PE-A + Troj/Krypt-CK?


File Info:

crc32: 5D221A5Bmd5: 54cb3a16f18156a81279e00b1ae33f36name: 54CB3A16F18156A81279E00B1AE33F36.mlwsha1: 8c41281e6b2c20cfbbf0dc0da984a1c86c4ead7fsha256: 1ec49c27f100729fd69a17fe1b8da2cdfc62f218f4e64cf4b900b1982c1523b7sha512: 71a2ee433331e8a42f9a94bf8e54df292f65d4b9394d83b9ad7000d93d449422498a39c20fe69d24c928cd3083a2c633a0980e55d100e307ffd6248647c1c8bcssdeep: 12288:T6kQAdVYKnZ5p6B1zEd+gRPu6F4BzOfuhrQyu/aQQ0JMO4OSnW1eu8nmTjVjmpqW:T6EVYs5UEBF4Bzev/aN0Jr4OSWTQm/VGtype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

InternalName: sajbmoumunu.apeProductVersion: 7.59.29.38Copyright: Copyrighz (C) 2021, fudkagataTranslation: 0x0129 0x009f

ML/PE-A + Troj/Krypt-CK also known as:

Bkav W32.AIDetect.malware1
Lionic Trojan.Win32.Stop.j!c
Elastic malicious (high confidence)
DrWeb Trojan.DownLoader42.45920
ClamAV Win.Malware.Fragtor-9891492-0
ALYac Trojan.GenericKDZ.77557
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_90% (W)
Alibaba Ransom:Win32/StopCrypt.20331bba
K7GW Trojan ( 0058221e1 )
K7AntiVirus Trojan ( 0058221e1 )
Cyren W32/Kryptik.EWJ.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HMJP
APEX Malicious
Avast Win32:RansomX-gen [Ransom]
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-Ransom.Win32.Stop.gen
BitDefender Trojan.GenericKDZ.77557
NANO-Antivirus Trojan.Win32.Stop.jaqgcy
MicroWorld-eScan Trojan.GenericKDZ.77557
Ad-Aware Trojan.GenericKDZ.77557
Sophos ML/PE-A + Troj/Krypt-CK
BitDefenderTheta Gen:NN.ZexaF.34142.Qq1@ayYZLYbc
McAfee-GW-Edition BehavesLike.Win32.Generic.jc
FireEye Generic.mg.54cb3a16f18156a8
Emsisoft Trojan.Crypt (A)
SentinelOne Static AI – Malicious PE
Jiangmin Trojan.PSW.Racealer.ddz
Avira TR/AD.InstaBot.aroax
Kingsoft Win32.Troj.Undef.(kcloud)
Microsoft Ransom:Win32/StopCrypt.MUK!MTB
Gridinsoft Ransom.Win32.STOP.ko!se34917
Arcabit Trojan.Generic.D12EF5
GData Trojan.GenericKDZ.77557
AhnLab-V3 CoinMiner/Win.Glupteba.R440555
Acronis suspicious
McAfee Packed-GDT!54CB3A16F181
MAX malware (ai score=82)
VBA32 Trojan.Injuke
Malwarebytes Trojan.MalPack.GS
Panda Trj/GdSda.A
Rising Trojan.Kryptik!1.D977 (CLASSIC)
Ikarus Trojan.Win32.Crypt
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/GenKryptik.FKEZ!tr
AVG Win32:RansomX-gen [Ransom]
Paloalto generic.ml

How to remove ML/PE-A + Troj/Krypt-CK?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

4 mins ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

8 mins ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

9 mins ago

What is “PUADlManager:Win32/Avarus”?

The PUADlManager:Win32/Avarus is considered dangerous by lots of security experts. When this infection is active,…

13 mins ago

VHO:RiskTool.Win32.ProcPatcher information

The VHO:RiskTool.Win32.ProcPatcher is considered dangerous by lots of security experts. When this infection is active,…

49 mins ago

Lazy.280688 removal guide

The Lazy.280688 is considered dangerous by lots of security experts. When this infection is active,…

2 hours ago