Malware

ML/PE-A + W32/Pluto-A removal guide

Malware Removal

The ML/PE-A + W32/Pluto-A is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + W32/Pluto-A virus can do?

  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Likely virus infection of existing system binary

How to determine ML/PE-A + W32/Pluto-A?


File Info:

name: 4F1A3040181C364AEEF5.mlw
path: /opt/CAPEv2/storage/binaries/643e54ab6e4baedfd9c3d75ad0fcad465093c53fc987e81fb26fd2b3260adf4e
crc32: 43FC1A20
md5: 4f1a3040181c364aeef56bebe0fb3087
sha1: d7e48483f75dca21a73894414ec587ab5c369056
sha256: 643e54ab6e4baedfd9c3d75ad0fcad465093c53fc987e81fb26fd2b3260adf4e
sha512: 977d27f633e53ac2e62d19e3c2f922a825a20e0c85610ea6b3b3b39cca76d1316da4cf3159067f2e7f8118b5cd8f3edeacc4bf66f3a0646014d83578e993277d
ssdeep: 6144:BbDIRKm5uIfz/NJijkKSxvXyIvc18zOGpqhFz8MXNsIk7F/Oyd:BbkUm5uJjDSx5c16pqrfCb
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C7947D26FA80C833D2731A388C4BD694D826BE903E7959473BE51F0D5F3E78179262D6
sha3_384: a8b118294a5e97b49d4d3f610684a8074b9bc0dc8464d5deba488cdb014739572c099c32e68ca29009b9a5a350608feb
ep_bytes: 558bec83c4f453b8605c4500e80f06fb
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

ML/PE-A + W32/Pluto-A also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.36087542
FireEyeGeneric.mg.4f1a3040181c364a
CAT-QuickHealBackdoor.GenericPMF.S18162222
McAfeeW32/Pluto.gen@MM
CylanceUnsafe
ZillyaWorm.Pluto.Win32.2
SangforVirus.Win32.Save.a
K7AntiVirusEmailWorm ( 005327141 )
K7GWEmailWorm ( 005327141 )
Cybereasonmalicious.0181c3
BaiduWin32.Worm.Eggnog.a
CyrenW32/DelfInject.E.gen!Eldorado
SymantecW32.HLLW.Pluto
ESET-NOD32Win32/Pluto.A
APEXMalicious
ClamAVWin.Worm.Fearso-7358009-0
KasperskyEmail-Worm.Win32.Pluto.gen
BitDefenderTrojan.GenericKD.36087542
NANO-AntivirusTrojan.Win32.Pluto.iaigts
AvastWin32:KillAV-XB [Trj]
TencentTrojan.Win32.BitCoinMiner.la
Ad-AwareTrojan.GenericKD.36087542
TACHYONWorm/W32.DP-Pluto.Zen
SophosML/PE-A + W32/Pluto-A
ComodoWorm.Win32.Pluto.A@2enn
DrWebWin32.HLLM.Pluton.1
VIPRETrojan.Win32.Generic!BT
TrendMicroWorm.Win32.PLUTON.SMTH
McAfee-GW-EditionBehavesLike.Win32.Pluto.gh
EmsisoftTrojan.GenericKD.36087542 (B)
SentinelOneStatic AI – Malicious PE
GDataWin32.Worm.Pluto.A
JiangminWorm/Sramota.qz
eGambitUnsafe.AI_Score_99%
AviraTR/Downloader.Gen
Antiy-AVLTrojan/Generic.ASMalwS.BA9CD
MicrosoftWorm:Win32/Pluto.A@mm
CynetMalicious (score: 100)
AhnLab-V3Worm/Win32.Pluto.C1524835
Acronissuspicious
BitDefenderThetaAI:Packer.7961432E21
ALYacTrojan.GenericKD.36087542
MAXmalware (ai score=80)
VBA32Trojan.Agent
MalwarebytesMalware.AI.300557422
TrendMicro-HouseCallWorm.Win32.PLUTON.SMTH
RisingTrojan.Killav!1.66BF (CLASSIC)
IkarusTrojan.I-Worm.Pluto
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Pluto.A!worm
AVGWin32:KillAV-XB [Trj]
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_100% (D)

How to remove ML/PE-A + W32/Pluto-A?

ML/PE-A + W32/Pluto-A removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment