Malware

ML/PE-A + W32/Ramnit-BI removal instruction

Malware Removal

The ML/PE-A + W32/Ramnit-BI is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What ML/PE-A + W32/Ramnit-BI virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Expresses interest in specific running processes
  • Manipulates data from or to the Recycle Bin
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Catalan
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Tries to suspend Cuckoo threads to prevent logging of malicious activity
  • Behavioural detection: Injection (inter-process)
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Installs itself for autorun at Windows startup
  • CAPE detected the Ramnit malware family

How to determine ML/PE-A + W32/Ramnit-BI?


File Info:

name: 9F029563E64B322C3D52.mlw
path: /opt/CAPEv2/storage/binaries/b85d72032c3c2fe8e7f7b59fe98fd15d19db5ed8112ff9c6e4ae62907fbdf875
crc32: 340E94F6
md5: 9f029563e64b322c3d52c8469a4e4320
sha1: 51d43c3711aa1c2a31662a0e5550b00c7bdc6d09
sha256: b85d72032c3c2fe8e7f7b59fe98fd15d19db5ed8112ff9c6e4ae62907fbdf875
sha512: 85d53b65b4b9a02b96ee7647540adc9f34876c2db0ba4cf876cb27637917ea0f9910eede430301715d5fdc20fa5643595ccf1202b3bf47feec6ec4a888844eb0
ssdeep: 768:d06R0UcgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9ICW:7R0sn3Pc0LCH9MtbvabUDzJYWu3B
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1A993D045B934B6DEF6A996358444FF805F3CBC2A0DF3C5B6345C22CEAA39C89864472D
sha3_384: 14f4e86e4ac0ff5436b87b545733383eb93ffe0827c715b1550b338e14f892e857d491ac6e30b3dce5413d22bf1e6284
ep_bytes: 558bec83ec2c8165ec000000008d5b56
timestamp: 2004-02-25 23:33:51

Version Info:

CompanyName: Macromedia, Inc.
FileDescription: Macromedia Flash Player 7.0 r19
FileVersion: 7,0,19,0
InternalName: Macromedia Flash Player 7.0
LegalCopyright: Copyright © 1996-2003 Macromedia, Inc.
LegalTrademarks: Macromedia Flash Player
OriginalFilename: SAFlashPlayer.exe
ProductName: Shockwave Flash
ProductVersion: 7,0,19,0
Translation: 0x0409 0x04b0

ML/PE-A + W32/Ramnit-BI also known as:

LionicTrojan.Win32.Generic.lIHt
Elasticmalicious (high confidence)
MicroWorld-eScanWin32.Virtob.Gen.12
FireEyeGeneric.mg.9f029563e64b322c
CAT-QuickHealW32.Virut.G
McAfeePWS-Zbot.gen.di
CylanceUnsafe
ZillyaBackdoor.CPEX.Win32.38048
SangforVirus.Win32.Virtob.12
K7AntiVirusVirus ( f10002001 )
AlibabaPacked:Win32/Ramnit.b3d6acd4
K7GWVirus ( f10002001 )
Cybereasonmalicious.3e64b3
BitDefenderThetaAI:FileInfector.C9457D4313
VirITWin32.Scribble.Q
CyrenW32/Ramnit.F.gen!Eldorado
SymantecPacked.Protexor!gen1
ESET-NOD32a variant of Win32/Ramnit.AU.Gen
BaiduWin32.Trojan.Nimnul.a
TrendMicro-HouseCallWORM_PALEVO.SMGD
Paloaltogeneric.ml
ClamAVWin.Virus.Virut-6804273-0
KasperskyPacked.Win32.Krap.ar
BitDefenderWin32.Virtob.Gen.12
NANO-AntivirusTrojan.Win32.Ramnit.bbgdmp
ViRobotWorm.Win32.A.Net-Koobface.126464
AvastWin32:Vitro [Inf]
TencentTrojan.Win32.Koobface.udb
Ad-AwareWin32.Virtob.Gen.12
EmsisoftWin32.Virtob.Gen.12 (B)
ComodoTrojWare.Win32.Kryptik.ILZ@39m3x2
DrWebTrojan.Siggen2.9448
VIPREVirus.Win32.Virut.ce (v)
TrendMicroWORM_PALEVO.SMGD
McAfee-GW-EditionBehavesLike.Win32.Dropper.nm
SophosML/PE-A + W32/Ramnit-BI
IkarusVirus.Win32.Ramnit
GDataWin32.Virtob.Gen.12
JiangminPacked.Krap.dljx
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=88)
Antiy-AVLTrojan/Generic.ASMalwS.869380
KingsoftHeur.SSC.1123.0010.(kcloud)
GridinsoftRansom.Win32.Miner.sa
SUPERAntiSpywareTrojan.Agent/Gen-Ramnit
APEXMalicious
MicrosoftTrojan:Win32/Ramnit
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Krap.R20076
Acronissuspicious
MalwarebytesTrojan.Downloader
RisingWin32.Ramnit.m (CLOUD)
YandexTrojan.GenAsa!MLownxgq9A8
SentinelOneStatic AI – Malicious PE
MaxSecurePacked.Krap.ar
FortinetW32/CoinMiner.F
AVGWin32:Vitro [Inf]
PandaTrj/Pck_Pretorx.A
CrowdStrikewin/malicious_confidence_100% (W)

How to remove ML/PE-A + W32/Ramnit-BI?

ML/PE-A + W32/Ramnit-BI removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment