Backdoor

Backdoor.MSIL.Mokes.bi removal tips

Malware Removal

The Backdoor.MSIL.Mokes.bi is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.MSIL.Mokes.bi virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Attempts to connect to a dead IP:Port (5 unique times)
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Looks up the external IP address
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Checks for the presence of known windows from debuggers and forensic tools
  • Network activity contains more than one unique useragent.
  • Creates a hidden or system file
  • Attempts to modify proxy settings
  • Attempts to disable Windows Defender
  • Attempts to create or modify system certificates
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
t.gogamec.com
cdn.discordapp.com
www.listincode.com
g-localdevice.biz
ocsp.digicert.com
hydro-power-plant.com
apps.identrust.com
fouratlinks.com
statuse.digitalcertvalidation.com
ipinfo.io
iplogger.org

How to determine Backdoor.MSIL.Mokes.bi?


File Info:

crc32: F6C30B8F
md5: 21e3892393a88c58639d42134d1da5aa
name: 21E3892393A88C58639D42134D1DA5AA.mlw
sha1: 8d23d25b51a37eb18f0a95ed32b135fea2feb6de
sha256: b6101fb0af830aca7b3480f0286494327759ef814d18e5a46bdbe369fcfb52e2
sha512: b61b83791357db8dddf6d48ca6e4cf13344d0459113a40451ac98d3c8810deeccc4f05253c64042c5a0fc19f56f69d375fc1c21abec9e37d28a58c0ca72325a2
ssdeep: 196608:J84fXzlrqklq1rP2i4JqJIZUr28uKRny/dqJTpbD:J8gXNflGjfeKrxqqJTpbD
type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive

Version Info:

0: [No Data]

Backdoor.MSIL.Mokes.bi also known as:

Elasticmalicious (high confidence)
DrWebTrojan.Siggen15.41587
CynetMalicious (score: 100)
CAT-QuickHealTrojan.SabsikIH.S21959152
ALYacGen:Variant.Jaik.45703
Cybereasonmalicious.393a88
CyrenW32/Fugrafa.X.gen!Eldorado
ESET-NOD32multiple detections
APEXMalicious
AvastWin32:TrojanX-gen [Trj]
ClamAVWin.Packed.Barys-9859531-0
KasperskyBackdoor.MSIL.Mokes.bi
BitDefenderGen:Variant.Jaik.45703
MicroWorld-eScanGen:Variant.Jaik.45703
BitDefenderThetaGen:NN.ZedlaF.34266.n88baOE@FOp
TrendMicroTROJ_GEN.R002C0WKE21
McAfee-GW-EditionBehavesLike.Win32.Generic.wc
FireEyeGeneric.mg.21e3892393a88c58
EmsisoftGen:Variant.Jaik.45703 (B)
SentinelOneStatic AI – Suspicious PE
AviraHEUR/AGEN.1144141
eGambitUnsafe.AI_Score_100%
Antiy-AVLTrojan/Generic.ASMalwS.34CD6A4
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:MSIL/AgentTesla.JGB!MTB
ArcabitTrojan.Jaik.DB287
GDataGen:Variant.Jaik.45703
MAXmalware (ai score=89)
VBA32BScope.Trojan.Agentb
MalwarebytesTrojan.Dropper.SFX.Generic
TrendMicro-HouseCallTROJ_GEN.R002C0WKE21
RisingDropper.Agent/NSIS!1.D805 (CLASSIC:xSkAJ7FNTGInj46JgtYk3w)
FortinetW32/BSE.4Q7Q!tr
AVGWin32:TrojanX-gen [Trj]

How to remove Backdoor.MSIL.Mokes.bi?

Backdoor.MSIL.Mokes.bi removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment