Malware

How to remove “W32/Cabble-A”?

Malware Removal

The W32/Cabble-A is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What W32/Cabble-A virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • HTTPS urls from behavior.
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities to create a scheduled task
  • CAPE detected the RedLine malware family
  • Attempts to identify installed AV products by installation directory
  • Attempts to modify proxy settings
  • Deletes executed files from disk
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine W32/Cabble-A?


File Info:

name: 75AFD0911B5E5973EBE3.mlw
path: /opt/CAPEv2/storage/binaries/2aa304e07a97df1f58cf9f6247e5925fc5f89ffb16dfbbe8778dcb328a5e5d4a
crc32: EADF1E2C
md5: 75afd0911b5e5973ebe38829f05f2c26
sha1: 43e577bbaaf909c1fa6aebb0e1ae0e0480922e3b
sha256: 2aa304e07a97df1f58cf9f6247e5925fc5f89ffb16dfbbe8778dcb328a5e5d4a
sha512: 87d116f88a1401b95a24d508e94112fab100f0c59cf938d83406bdf206fb16eda3e9c630b85ef105b280e8a6633aca6252a7807e6ec51872eb4751952a5fec29
ssdeep: 24576:7ySSiodM88J8l6rW6ksKeQurQU22BqFt4/mXVXq:uScdd8JfrosUuEf2kt4e
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1914523879BE48476C9F4AB701CFF06870E357DD1C570A31B93A66D0A4CB26E1A9703A7
sha3_384: 29736b74fa1a573acdc969dfc3d15c581dee15fddcb942ccf342f1b5b8931db6bd1b8d31e756aa7c42d2b73371c1a4a1
ep_bytes: e8f0060000e9000000006a5868b87240
timestamp: 2022-05-24 22:49:06

Version Info:

CompanyName: Microsoft Corporation
FileDescription: Win32 Cabinet Self-Extractor
FileVersion: 11.00.17763.1 (WinBuild.160101.0800)
InternalName: Wextract
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFilename: WEXTRACT.EXE .MUI
ProductName: Internet Explorer
ProductVersion: 11.00.17763.1
Translation: 0x0409 0x04b0

W32/Cabble-A also known as:

Elasticmalicious (high confidence)
CynetMalicious (score: 99)
FireEyeGeneric.mg.75afd0911b5e5973
McAfeeArtemis!75AFD0911B5E
Cylanceunsafe
VIPREGen:Variant.MSILHeracles.74575
CyrenW32/Kryptik.JKR.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Spy.RedLine.A
APEXMalicious
ClamAVWin.Packed.Lazy-9958163-0
KasperskyUDS:Trojan.Win32.Zenpak.gen
SUPERAntiSpywareTrojan.Agent/Gen-Downloader
AvastWin32:PWSX-gen [Trj]
TencentTrojan-Spy.MSIL.Stealer.hjw
SophosW32/Cabble-A
F-SecureHeuristic.HEUR/AGEN.1310591
TrendMicroTrojanSpy.Win32.REDLINE.YXDDKZ
McAfee-GW-EditionBehavesLike.Win32.AgentTesla.tc
Trapminemalicious.high.ml.score
SentinelOneStatic AI – Malicious SFX
AviraHEUR/AGEN.1310591
Antiy-AVLTrojan[Spy]/MSIL.RedLine
ZoneAlarmVHO:Trojan-Spy.Win32.Stealer.gen
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
GoogleDetected
ALYacGen:Variant.MSILHeracles.74575
MalwarebytesSpyware.RedLineStealer
TrendMicro-HouseCallTrojanSpy.Win32.REDLINE.YXDDKZ
RisingTrojan.Kryptik!1.E47B (CLASSIC:bWQ1OtWVCEq2toMX)
IkarusTrojan.Kryptik
FortinetMSIL/RedLine.A!tr
AVGWin32:PWSX-gen [Trj]

How to remove W32/Cabble-A?

W32/Cabble-A removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment