Malware

ML/PE-A + W32/Autorun-BRF removal tips

Malware Removal

The ML/PE-A + W32/Autorun-BRF is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + W32/Autorun-BRF virus can do?

  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Unconventionial language used in binary resources: Turkish
  • Installs itself for autorun at Windows startup
  • Operates on local firewall’s policies and settings
  • Creates a slightly modified copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
ftp.byethost12.com
griptoloji.host-ed.net
ftp.tripod.com

How to determine ML/PE-A + W32/Autorun-BRF?


File Info:

crc32: 486E86C4
md5: ae90df28155813ecfb4ccb3d8106f7fa
name: AE90DF28155813ECFB4CCB3D8106F7FA.mlw
sha1: f410e7b2c5a67aff1b2cac09e2086e1ddbedd8bf
sha256: 64d14efd9d928cd32589db55b7c124b9aa28910d060b09f2256d89b6c17bf842
sha512: 7377c7db1bcc8294b6c2f7e881b6919ea07573c82e39a8188be9153bfbfa7d7b41140882e66e6f1dc1392610c9a4b189d9cb938c5a8b71b4facf9048eec6bdc2
ssdeep: 1536:DvVQb4cLIkN+4Weat2RKLjWlC48Pp9JAcjdRSrowy1+MT:DvVQLIkLWeaA8KlCph9erowyvT
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9 2011
InternalName: jusched
FileVersion: 6.0.150.3
CompanyName:
PrivateBuild: Sun Microsystems, Inc.
LegalTrademarks:
Comments:
ProductName: Java(TM) Platform SE 6 U15
SpecialBuild:
ProductVersion: 6.0.150.3
FileDescription:
OriginalFilename: jusched
Translation: 0x0000 0x04b0

ML/PE-A + W32/Autorun-BRF also known as:

K7AntiVirusTrojan ( 001f4ea51 )
Elasticmalicious (high confidence)
DrWebBackDoor.IRC.Cirilico.163
ClamAVWin.Worm.Ganelp-6776766-0
CAT-QuickHealWorm.Ganelp.A6
ALYacGen:Variant.Graftor.1103
CylanceUnsafe
ZillyaTrojan.Agent.Win32.181553
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
K7GWTrojan ( 001f4ea51 )
Cybereasonmalicious.815581
BaiduWin32.Trojan.Agent.dc
CyrenW32/Agent.KI.gen!Eldorado
SymantecW32.Griptolo
ESET-NOD32a variant of Win32/Agent.SRG
APEXMalicious
AvastWin32:Dropper-GHV [Drp]
CynetMalicious (score: 100)
KasperskyWorm.Win32.Juched.fia
BitDefenderGen:Variant.Graftor.1103
NANO-AntivirusTrojan.Win32.Buzy.fwrulw
MicroWorld-eScanGen:Variant.Graftor.1103
TencentTrojan.Win32.FakeFolder.uu
Ad-AwareGen:Variant.Graftor.1103
SophosML/PE-A + W32/Autorun-BRF
ComodoWorm.Win32.Jushed.KA@4cysvx
BitDefenderThetaGen:NN.ZexaF.34236.mG2@aK7Fh@oG
VIPRETrojan.Win32.Autorun.BRF (v)
TrendMicroWORM_GANELP.SMIA
McAfee-GW-EditionBehavesLike.Win32.Autorun.ct
FireEyeGeneric.mg.ae90df28155813ec
EmsisoftGen:Variant.Graftor.1103 (B)
SentinelOneStatic AI – Malicious PE
JiangminWorm.Juched.aa
WebrootW32.Worm.H
AviraTR/Buzy.416012
eGambitUnsafe.AI_Score_71%
Antiy-AVLTrojan/Generic.ASMalwS.7DD35
MicrosoftWorm:Win32/Ganelp.E
SUPERAntiSpywareTrojan.Agent/Gen-Ganel
GDataWin32.Trojan.PSE.14G5P14
AhnLab-V3Trojan/Win32.Npkon.R18258
Acronissuspicious
McAfeeW32/Autorun.worm.aacd
MAXmalware (ai score=87)
VBA32Worm.Juched
MalwarebytesBackdoor.IRCBot
PandaTrj/Genetic.gen
TrendMicro-HouseCallWORM_GANELP.SMIA
RisingTrojan.Agent!1.C135 (CLASSIC)
YandexTrojan.GenAsa!rq4OdlFF3MY
IkarusTrojan.Win32.Webprefix
FortinetW32/CoinMiner.F
AVGWin32:Dropper-GHV [Drp]

How to remove ML/PE-A + W32/Autorun-BRF?

ML/PE-A + W32/Autorun-BRF removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment