Malware

What is “ML/PE-A + Troj/Zbot-LVE”?

Malware Removal

The ML/PE-A + Troj/Zbot-LVE is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + Troj/Zbot-LVE virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • Detects Sandboxie through the presence of a library
  • Detects the presence of Wine emulator via function name
  • Deletes its original binary from disk
  • Network activity detected but not expressed in API logs
  • Attempts to identify installed analysis tools by a known file location
  • Checks for the presence of known devices from debuggers and forensic tools
  • Detects the presence of Wine emulator via registry key
  • Detects Sandboxie using a known mutex
  • Creates a copy of itself
  • Checks for a known DeepFreeze Frozen State Mutex
  • Collects information to fingerprint the system

How to determine ML/PE-A + Troj/Zbot-LVE?


File Info:

crc32: 7A1F7F0B
md5: 0f42f59d02923de4101240cfd26c9771
name: 0F42F59D02923DE4101240CFD26C9771.mlw
sha1: 83bffb47a5475edccd7dc5a8ba98759e19cafbfe
sha256: 197d6f787b2023605f0129af1774fdfb7850e7e2eccbc0e20c6fbb34a26cb9e5
sha512: 8a088895bc766d70fe1c43fde95c177e06649b9ac95f3ce5e7a05d86b1cedcb72306e77f99362d357919cc53df0b154bdadb3bfb797ed7e2c538db28089a2db4
ssdeep: 3072:P6f6TKe8Q5Jw/LsaDOLWJq1yFjdJl5ZvFRo6dX3Dig:Ppnw/QIOSw1W/x3Gg
type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows

Version Info:

0: [No Data]

ML/PE-A + Troj/Zbot-LVE also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 0051ae131 )
LionicTrojan.Win32.Refinka.4!c
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Panda.11620
McAfeeRansomware-GIK!0F42F59D0292
CylanceUnsafe
ZillyaTrojan.Refinka.Win32.1145
SangforSuspicious.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
K7GWTrojan ( 0051ae131 )
Cybereasonmalicious.d02923
BaiduWin32.Trojan.Kryptik.rb
SymantecPacked.Generic.493
ESET-NOD32Win32/Spy.Zbot.ACZ
APEXMalicious
AvastWin32:Malware-gen
CynetMalicious (score: 100)
KasperskyUDS:DangerousObject.Multi.Generic
BitDefenderTrojan.Crypt.Agent.BF
NANO-AntivirusTrojan.Win32.Refinka.euyasc
MicroWorld-eScanTrojan.Crypt.Agent.BF
TencentMalware.Win32.Gencirc.10ba9edf
Ad-AwareTrojan.Crypt.Agent.BF
SophosML/PE-A + Troj/Zbot-LVE
ComodoTrojWare.Win32.Crypt.C@7vajd0
BitDefenderThetaGen:NN.ZexaF.34266.kqW@amxqs2d
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_CERBER.SM38
McAfee-GW-EditionBehavesLike.Win32.Drixed.cc
FireEyeGeneric.mg.0f42f59d02923de4
EmsisoftTrojan-Ransom.Locky (A)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Refinka.aca
AviraTR/Crypt.XPACK.Gen8
eGambitUnsafe.AI_Score_79%
Antiy-AVLTrojan/Generic.ASMalwS.22778B7
MicrosoftTrojan:Win32/Zuepan.A
GDataTrojan.Crypt.Agent.BF
AhnLab-V3Trojan/Win32.Lebag.R212037
Acronissuspicious
VBA32Trojan.Refinka
MAXmalware (ai score=100)
MalwarebytesRansom.Locky
PandaTrj/CI.A
TrendMicro-HouseCallRansom_CERBER.SM38
RisingTrojan.Kryptik!1.AE8C (CLASSIC)
YandexTrojan.GenAsa!6hllvVH+m2E
IkarusTrojan.Crypt.Agent
FortinetW32/Kryptik.CQXJ!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove ML/PE-A + Troj/Zbot-LVE?

ML/PE-A + Troj/Zbot-LVE removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment