Malware

ML/PE-A + Troj/Vbinder-D removal tips

Malware Removal

The ML/PE-A + Troj/Vbinder-D is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Troj/Vbinder-D virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Attempts to connect to a dead IP:Port (6 unique times)
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Creates a hidden or system file
  • Attempts to modify proxy settings
  • Anomalous binary characteristics

Related domains:

www.bing.com
ocsp.pki.goog

How to determine ML/PE-A + Troj/Vbinder-D?


File Info:

crc32: 5A8E9120
md5: ec2d0aabc74a735a73baba10c7704159
name: EC2D0AABC74A735A73BABA10C7704159.mlw
sha1: 549cb41550fc1dc88869454409a8dcdf9f171300
sha256: 64f693491759f8d46290c91752b2171213a9c448efadfba65584050c7e91f12d
sha512: 9022326e3704557c74e63ebd4a82df4d450f35467f92c4618c7ce2dd7630a25b82c3dbbf18cbde1b2083318d0b3c63fd9e703acf0657f3cf3125739ff956590f
ssdeep: 49152:TEhx331ic57uUW/6ZY2k2hR0/KnQ/pm4aWQ:MAdUW/6Zo2hR0ynQhmTWQ
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

ML/PE-A + Troj/Vbinder-D also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.MSIL.Injector.MF
FireEyeGeneric.mg.ec2d0aabc74a735a
CAT-QuickHealVirtool.Vbinder.A4
ALYacTrojan.MSIL.Injector.MF
CylanceUnsafe
VIPREDetect.Trojan.Win32.Small.nmm (v)
SangforTrojan.Win32.Save.a
K7AntiVirusBackdoor ( 0040f6fb1 )
BitDefenderTrojan.MSIL.Injector.MF
K7GWTrojan ( 0047fb211 )
Cybereasonmalicious.bc74a7
BaiduWin32.Trojan-Dropper.Small.o
CyrenW32/GenTroj.S.gen!Eldorado
SymantecTrojan.Dropper!g1
APEXMalicious
AvastWin32:GenMalicious-NUS [Trj]
ClamAVWin.Trojan.Poison-8692
KasperskyBackdoor.Win32.Poison.ggrf
NANO-AntivirusTrojan.Win32.Poison.cbeljp
ViRobotBackdoor.Win32.Agent.67584.L
RisingMalware.Heuristic!ET#100% (RDMK:cmRtazpsLP2ARm96ps+ysgawSbM1)
Ad-AwareTrojan.MSIL.Injector.MF
EmsisoftTrojan.MSIL.Injector.MF (B)
ComodoTrojWare.Win32.Ransom.Xorist.ET@4mg4hg
F-SecureTrojan.TR/Dropper.Gen
DrWebTrojan.MulDrop8.22787
TrendMicroTROJ_VBINDER.SM
McAfee-GW-EditionBehavesLike.Win32.Generic.tc
SophosML/PE-A + Troj/Vbinder-D
IkarusBackdoor.Poison
JiangminBackdoor/Poison.abtg
AviraTR/Dropper.Gen
MAXmalware (ai score=87)
MicrosoftVirTool:Win32/Vbinder
GridinsoftBackdoor.Win32.Dropper.bot!s1
ArcabitTrojan.MSIL.Injector.MF
ZoneAlarmBackdoor.Win32.Poison.ggrf
GDataWin32.Trojan-Dropper.Agent.AMY
CynetMalicious (score: 100)
AhnLab-V3Backdoor/Win32.Poison.R72119
Acronissuspicious
McAfeeGenericRXAC-LG!EC2D0AABC74A
VBA32Backdoor.Poison
MalwarebytesBladabindi.Backdoor.Njrat.DDS
PandaTrj/Injector.BH
ESET-NOD32Win32/TrojanDropper.Small.NMM
TrendMicro-HouseCallTROJ_VBINDER.SM
TencentMalware.Win32.Gencirc.10b3e7f9
YandexTrojan.GenAsa!T8P/UkYT/k8
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Xorist.ET!tr
AVGWin32:GenMalicious-NUS [Trj]
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360HEUR/QVM20.1.A4C5.Malware.Gen

How to remove ML/PE-A + Troj/Vbinder-D?

ML/PE-A + Troj/Vbinder-D removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment