Backdoor

Backdoor.MokesPMF.S26188934 removal tips

Malware Removal

The Backdoor.MokesPMF.S26188934 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.MokesPMF.S26188934 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Divehi
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Enumerates services, possibly for anti-virtualization
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Installs itself for autorun at Windows startup
  • Installs itself for autorun at Windows startup
  • CAPE detected the Tofsee malware family
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Backdoor.MokesPMF.S26188934?


File Info:

name: 0926A3972CE928AF8EDB.mlw
path: /opt/CAPEv2/storage/binaries/b1d15c53b836d472cec61813a2e701ce8f0b998de389fa62b0a883be806df7f0
crc32: 9448E86B
md5: 0926a3972ce928af8edb37accc18d1b1
sha1: 180ed00802ad3e1bc8dfecf102ec17312d293b8a
sha256: b1d15c53b836d472cec61813a2e701ce8f0b998de389fa62b0a883be806df7f0
sha512: 3a66f6f1ab99fe460a9e45bf99c37bf3212ba3c6445cb7d1e539787a88450196e810727560eaacd072ae730d4a7a9ace56d7bc1c1c711a26c23453c05b523f56
ssdeep: 6144:AnDYWHPfj5G2pVBo14zJGtyZlataVcGq4MWEQkS:ADp1Bo12A4ZlmD54MWM
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T124E65C3149F48D37E69540BD7A2EBF12DBFE8FA0E298A46B149141F6101F28960DF91F
sha3_384: 122d8e04fc5d0218bcbc9c78c9a41a39dd31f5fcfa19e9ea4d27c4fa11fa27e150b1dbe3a5c033933c4c4afb11b77db6
ep_bytes: 8bff558bece836960000e8110000005d
timestamp: 2020-07-21 03:40:56

Version Info:

0: [No Data]

Backdoor.MokesPMF.S26188934 also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
DrWebTrojan.Siggen16.31456
MicroWorld-eScanTrojan.GenericKDZ.82258
FireEyeGeneric.mg.0926a3972ce928af
CAT-QuickHealBackdoor.MokesPMF.S26188934
McAfeePacked-GEE!0926A3972CE9
CylanceUnsafe
SangforTrojan.Win32.Save.a
K7AntiVirusRiskware ( 00584baa1 )
K7GWRiskware ( 00584baa1 )
Cybereasonmalicious.802ad3
CyrenW32/Kryptik.GAL.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HNYU
APEXMalicious
ClamAVWin.Packed.Tofsee-9935687-0
KasperskyHEUR:Trojan.Win32.Zenpak.pef
BitDefenderTrojan.GenericKDZ.82258
AvastWin32:DropperX-gen [Drp]
Ad-AwareTrojan.GenericKDZ.82258
SophosML/PE-A + Troj/Krypt-FV
ZillyaTrojan.Kryptik.Win32.3667715
McAfee-GW-EditionBehavesLike.Win32.Injector.tz
EmsisoftTrojan.GenericKDZ.82258 (B)
SentinelOneStatic AI – Malicious PE
GDataWin32.Trojan.BSE.AUWCY
JiangminTrojan.Zenpak.jlm
MaxSecureTrojan.Malware.121218.susgen
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan[Backdoor]/Win32.Mokes
ArcabitTrojan.Generic.D14152
ZoneAlarmHEUR:Trojan.Win32.Zenpak.pef
MicrosoftTrojan:Win32/Raccrypt.GA!MTB
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.MalPE.R464654
Acronissuspicious
ALYacTrojan.GenericKDZ.82258
MAXmalware (ai score=86)
MalwarebytesTrojan.MalPack.GS
RisingMalware.Heuristic!ET#78% (RDMK:cmRtazo2MvmncOAl2vSkaeoaS7Xn)
YandexTrojan.Kryptik!YTohY67pTWM
IkarusTrojan-Ransom.StopCrypt
FortinetW32/Kryptik.HNZY!tr
AVGWin32:DropperX-gen [Drp]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_70% (D)

How to remove Backdoor.MokesPMF.S26188934?

Backdoor.MokesPMF.S26188934 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment