Backdoor

Should I remove “Backdoor.Win32.Mokes.aort”?

Malware Removal

The Backdoor.Win32.Mokes.aort is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.Win32.Mokes.aort virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Dynamic (imported) function loading detected
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Detects Sandboxie through the presence of a library
  • Detects Avast Antivirus through the presence of a library
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization
  • Anomalous binary characteristics

How to determine Backdoor.Win32.Mokes.aort?


File Info:

name: 2D0A6449FF138FD54672.mlw
path: /opt/CAPEv2/storage/binaries/4ea85a16b4b4bd923ad7614aded337fa4a88eab034e2c215c446bb81d04b879f
crc32: B2C86BE4
md5: 2d0a6449ff138fd54672583ce93e3304
sha1: bd49a3c8ff88145e54895c759eb0d823c6a59234
sha256: 4ea85a16b4b4bd923ad7614aded337fa4a88eab034e2c215c446bb81d04b879f
sha512: 518e6d42175f6ba7dea700873bbf6b374367f8082a5ac2fc3037a8980fadb3a4355c46c79110ff0395991a026d441cd4948a2c4150f0e6ff4a419dfbceda7b12
ssdeep: 3072:Gp3Zs6V1d7pUSouyD4iZLszFVo6wYRzoTzGciszMe2oQYxeVHkeuQyZw1p528:Gp31F0LkSRUzo2OzX2oQkzeuNuXx
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T12514E829B820E41FC5D141BA7EA4D9D99514BEF0E09821173DC33F025AA45FE9ED2FA3
sha3_384: 2ca14e9d54bb647fbf00a07a03b1b7df4a08b407279365ce88cfda72d211824ef51efe621c9aa8e86e2ff2c52487b5ec
ep_bytes: e993280000e9b3fdffff8bff558bec8b
timestamp: 2016-04-01 08:09:12

Version Info:

0: [No Data]

Backdoor.Win32.Mokes.aort also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Mokes.m!c
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
FireEyeGeneric.mg.2d0a6449ff138fd5
ALYacGen:Variant.Razy.740561
CylanceUnsafe
SangforBackdoor.Win32.Mokes.aort
K7AntiVirusTrojan ( 005742441 )
AlibabaBackdoor:Win32/Mokes.4869f88f
K7GWTrojan ( 005742441 )
Cybereasonmalicious.9ff138
CyrenW32/Kryptik.DED.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HHVK
APEXMalicious
Paloaltogeneric.ml
KasperskyBackdoor.Win32.Mokes.aort
BitDefenderGen:Variant.Razy.740561
MicroWorld-eScanGen:Variant.Razy.740561
AvastWin32:DropperX-gen [Drp]
TencentWin32.Backdoor.Mokes.Hqvq
SophosMal/Generic-S
TrendMicroTROJ_GEN.R002C0PB322
McAfee-GW-EditionGenericRXNJ-MG!2D0A6449FF13
EmsisoftGen:Variant.Razy.740561 (B)
AviraHEUR/AGEN.1207841
Antiy-AVLTrojan[Backdoor]/Win32.Mokes
GridinsoftRansom.Win32.Sabsik.sa
MicrosoftTrojan:Win32/Woreflint.A!cl
ZoneAlarmBackdoor.Win32.Mokes.aort
GDataWin32.Trojan-Downloader.SmokeLoader.K539D9
AhnLab-V3Malware/Win.Generic.R374742
McAfeeGenericRXNJ-MG!2D0A6449FF13
MAXmalware (ai score=85)
MalwarebytesTrojan.SmokeLoader
TrendMicro-HouseCallTROJ_GEN.R002C0PB322
RisingBackdoor.Mokes!8.619 (CLOUD)
SentinelOneStatic AI – Suspicious PE
FortinetW32/Agent.ACGU!tr
BitDefenderThetaGen:NN.ZexaF.34182.mu0@a4pT0Ami
AVGWin32:DropperX-gen [Drp]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Backdoor.Win32.Mokes.aort?

Backdoor.Win32.Mokes.aort removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment