Backdoor

Backdoor.Win32.Mokes.akod information

Malware Removal

The Backdoor.Win32.Mokes.akod is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Mokes.akod virus can do?

  • Executable code extraction
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Detects Sandboxie through the presence of a library
  • Detects Avast Antivirus through the presence of a library
  • Network activity detected but not expressed in API logs
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Backdoor.Win32.Mokes.akod?


File Info:

crc32: 269E3256
md5: 4da8445413700a770c7df036d84ee1cd
name: upload_file
sha1: 43c4c061833873486d6f12bd75456949d3b53f4a
sha256: 89e0507c4dc79363bdfbdc93dcbaa19084553db2c7fe3a8f746ff973b155c62a
sha512: 23e39f3daf7a023330cea689b81ddcdd2afeb84b9dbf6979bfc3982c6e7bc53c1b10747b5642797e6acf5227c34e30fe36c69ab0413a0d27088509976bee4baa
ssdeep: 3072:0O1LzxGZ9Vag6ujkyamUoo7Or0WpVJTtTDTtDhem/:0O1LsAyjZamroJGJTtTDTtD3/
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: xa9 Microsoft Corporation. All rights reserved.
InternalName: SMSvcHost.exe
FileVersion: 3.0.4506.5420 (Win7SP1.030729-5400)
CompanyName: Microsoft Corporation
PrivateBuild: DDBLD247
Comments: Flavor=Retail
ProductName: Microsoftxae .NET Framework
ProductVersion: 3.0.4506.5420
FileDescription: SMSvcHost.exe
OriginalFilename: SMSvcHost.exe
Translation: 0x0409 0x04b0

Backdoor.Win32.Mokes.akod also known as:

BkavW32.AIDetectVM.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.43887508
McAfeeGenericRXMB-KR!4DA844541370
CylanceUnsafe
SangforMalware
BitDefenderTrojan.GenericKD.43887508
K7GWTrojan ( 0056f7941 )
CrowdStrikewin/malicious_confidence_100% (W)
ArcabitTrojan.Generic.D29DAB94
TrendMicroTROJ_FRS.0NA103IP20
SymantecML.Attribute.HighConfidence
APEXMalicious
Paloaltogeneric.ml
KasperskyBackdoor.Win32.Mokes.akod
AlibabaBackdoor:Win32/Mokes.4d83dfa1
TencentMalware.Win32.Gencirc.10ce05be
Ad-AwareTrojan.GenericKD.43887508
EmsisoftTrojan.GenericKD.43887508 (B)
ComodoMalware@#kxjq1z2z2j87
F-SecureBackdoor.BDS/Mokes.iycyt
DrWebTrojan.DownLoader34.49770
VIPRETrojan.Win32.Generic!BT
InvinceaMal/Generic-R + Mal/EncPk-APV
McAfee-GW-EditionArtemis!Trojan
FireEyeGeneric.mg.4da8445413700a77
SophosMal/EncPk-APV
SentinelOneDFI – Malicious PE
WebrootW32.Trojan.Gen
AviraBDS/Mokes.iycyt
MAXmalware (ai score=100)
Antiy-AVLGrayWare/Win32.Kryptik.ehls
MicrosoftTrojan:Win32/Ymacco.AA89
ZoneAlarmBackdoor.Win32.Mokes.akod
GDataTrojan.GenericKD.43887508
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Wacatac.C4199611
VBA32BScope.Trojan.Encoder
ALYacTrojan.GenericKD.43887508
MalwarebytesTrojan.SmokeLoader
PandaTrj/GdSda.A
ESET-NOD32Win32/TrojanDownloader.Zurgop.DA
TrendMicro-HouseCallTROJ_FRS.0NA103IP20
RisingTrojan.Bunitu!8.109AF (TFE:2:GHjEnFJNmFO)
IkarusTrojan.Win32.Gencbl
eGambitPE.Heur.InvalidSig
FortinetW32/GenCBL.AS!tr
BitDefenderThetaGen:NN.ZexaF.34254.5u1@a4jvBjgi
AVGWin32:DropperX-gen [Drp]
Cybereasonmalicious.183387
AvastWin32:DropperX-gen [Drp]
Qihoo-360Generic/HEUR/QVM20.1.2027.Malware.Gen

How to remove Backdoor.Win32.Mokes.akod?

Backdoor.Win32.Mokes.akod removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment