Trojan

IL:Trojan.MSILMamut.2744 removal

Malware Removal

The IL:Trojan.MSILMamut.2744 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What IL:Trojan.MSILMamut.2744 virus can do?

  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine IL:Trojan.MSILMamut.2744?


File Info:

name: A3D83A0E1BA1286FD5A8.mlw
path: /opt/CAPEv2/storage/binaries/0631e6559fcedaeb4b289cf5f850ae6471d5b75bb2817e604152cbc00db418ea
crc32: 78A83EE6
md5: a3d83a0e1ba1286fd5a88c97aab06cc1
sha1: 95249d5c9186b12c5b307014690751eff40ce3d7
sha256: 0631e6559fcedaeb4b289cf5f850ae6471d5b75bb2817e604152cbc00db418ea
sha512: 112f21fce1317f2888656959d1e1c82e760fef4c669ea06fbf95a75408ebf1a4fba279af0cfd9eef612b6c1845233d10fe6b14abea4d61126ed8f77758325df2
ssdeep: 24576:kQtlyYHUt/vjJyyN7knW8BIt1UvlZc7Gu8pEQYwpXnmc+NIh:5yYHUt/vjXBX8BRZrdEQYwVnL+I
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19D35BF6C29A6C925F0AF333BC266455B89F47027324AFB492FC51CE1383F6528E466DD
sha3_384: 624ac1256ce15375b766033cd016fe569db458af874d854a47b193e3e5359c3caaeb88f9b6b6ed95c63b311356e38f0f
ep_bytes: ff250020400000000000000000000000
timestamp: 2022-06-04 02:48:57

Version Info:

Translation: 0x0000 0x04b0
Comments: Library of attributes which can be used to decorate your entities and generate hbm.xml mapping documents for NHibernate.
CompanyName: NHibernate.org
FileDescription: NHibernate.Mapping.Attributes
FileVersion: 3.0.0.0
InternalName: SxSRequireme.exe
LegalCopyright: Licensed under LGPL.
OriginalFilename: SxSRequireme.exe
ProductName: NHibernate.Mapping.Attributes
ProductVersion: 3.0.0.0
Assembly Version: 3.0.0.0

IL:Trojan.MSILMamut.2744 also known as:

BkavW32.AIDetectNet.01
LionicTrojan.MSIL.NanoBot.m!c
DrWebTrojan.Inject4.32383
MicroWorld-eScanIL:Trojan.MSILMamut.2744
CAT-QuickHealBackdoor.MSIL
ALYacIL:Trojan.MSILMamut.2744
CylanceUnsafe
SangforBackdoor.MSIL.NanoBot.gen
K7AntiVirusTrojan ( 0059370f1 )
AlibabaBackdoor:MSIL/NanoBot.10b5a2a4
K7GWTrojan ( 0059370f1 )
CyrenW32/MSIL_Kryptik.HIL.gen!Eldorado
Elasticmalicious (moderate confidence)
ESET-NOD32a variant of MSIL/GenKryptik.FVAV
TrendMicro-HouseCallTrojanSpy.MSIL.NEGASTEAL.SMG
Paloaltogeneric.ml
KasperskyHEUR:Backdoor.MSIL.NanoBot.gen
BitDefenderIL:Trojan.MSILMamut.2744
AvastWin32:PWSX-gen [Trj]
TencentMsil.Backdoor.Nanobot.Lnoa
Ad-AwareIL:Trojan.MSILMamut.2744
SophosMal/Generic-S
TrendMicroTrojanSpy.MSIL.NEGASTEAL.SMG
McAfee-GW-EditionGenericRXTC-JY!A3D83A0E1BA1
Trapminesuspicious.low.ml.score
FireEyeIL:Trojan.MSILMamut.2744
EmsisoftIL:Trojan.MSILMamut.2744 (B)
IkarusTrojan-Spy.Keylogger.AgentTesla
GDataIL:Trojan.MSILMamut.2744
AviraTR/Kryptik.uzrom
ArcabitIL:Trojan.MSILMamut.DAB8
ZoneAlarmHEUR:Backdoor.MSIL.NanoBot.gen
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.NEGASTEAL.C5140957
McAfeeGenericRXTC-JY!A3D83A0E1BA1
MalwarebytesMalware.AI.642313023
APEXMalicious
MAXmalware (ai score=86)
FortinetMSIL/GenKryptik.FVAV!tr
AVGWin32:PWSX-gen [Trj]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_100% (W)

How to remove IL:Trojan.MSILMamut.2744?

IL:Trojan.MSILMamut.2744 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment