Trojan

MSIL/TrojanDropper.Agent.FOD removal guide

Malware Removal

The MSIL/TrojanDropper.Agent.FOD is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What MSIL/TrojanDropper.Agent.FOD virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the RedLine malware family
  • Anomalous binary characteristics

How to determine MSIL/TrojanDropper.Agent.FOD?


File Info:

name: FC30238DA08DAE58481F.mlw
path: /opt/CAPEv2/storage/binaries/62841f7a3aa2cd5cfc5e87c2ed873b03be0551b91a5cb2bcaebb4f60894af18e
crc32: CE5ADA2E
md5: fc30238da08dae58481f201673052c1f
sha1: 2f6994e272936172f15ad9e21fd88a6ea8c8ac33
sha256: 62841f7a3aa2cd5cfc5e87c2ed873b03be0551b91a5cb2bcaebb4f60894af18e
sha512: eff0469a44a48456ae7b5a5d4518ada592d27589e48c49e33b65777c357f64ef8d16895c914c6c65c9f729f650840ed4be4eb56859baced33e6ca625c033bc13
ssdeep: 12288:Th1Lk70TnvjcocBawu9SrsORx+2+SxAvR:Pk70TrcZ2WsOW8xaR
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1A6C4E600D5C9E8A5C01A1032947DF5383899F297D2BBCCAFEB5D261464AE3D2E17BE4D
sha3_384: 94230472e3cac768356cb0b0a0f1dbcefb80f1cfca494c70c6fc97a1bf104f52f2375cd92fb49b9cca85f01f5d91e9bb
ep_bytes: e8e15c0000e9a4feffff8bff558bec83
timestamp: 2012-07-13 22:47:16

Version Info:

Translation: 0x0000 0x04b0
Comments:
CompanyName:
FileDescription: InstaFucking
FileVersion: 1.0.0.0
InternalName: PaypalFucking.exe
LegalCopyright: Copyright © 2020
LegalTrademarks:
OriginalFilename: PaypalFucking.exe
ProductName: InstaFucking
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

MSIL/TrojanDropper.Agent.FOD also known as:

LionicHeuristic.File.Generic.00×1!p
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.61733025
FireEyeGeneric.mg.fc30238da08dae58
ALYacTrojan.GenericKD.61733025
CylanceUnsafe
SangforTrojan.Win32.Save.a
AlibabaTrojan:MSIL/DropperX.29567857
CrowdStrikewin/malicious_confidence_70% (W)
BitDefenderThetaGen:NN.ZexaF.34646.Iq0@a4jwweb
CyrenW32/Agent.AIK.gen!Eldorado
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of MSIL/TrojanDropper.Agent.FOD
TrendMicro-HouseCallTROJ_GEN.R002H0CI322
KasperskyUDS:Trojan-Dropper.Win32.Agent
BitDefenderTrojan.GenericKD.61733025
CynetMalicious (score: 100)
AvastWin32:DropperX-gen [Drp]
TencentWin32.Trojan.Dropper.Ogil
Ad-AwareTrojan.GenericKD.61733025
EmsisoftTrojan.GenericKD.61733025 (B)
McAfee-GW-EditionBehavesLike.Win32.Generic.hc
Trapminemalicious.moderate.ml.score
SophosMal/Generic-S (PUA)
APEXMalicious
GDataTrojan.GenericKD.61733025
AviraTR/Drop.Agent.bzief
MAXmalware (ai score=89)
Antiy-AVLTrojan/Generic.ASMalwS.720E
MicrosoftBackdoor:Win32/Bladabindi!ml
GoogleDetected
McAfeeArtemis!FC30238DA08D
IkarusTrojan-Dropper.MSIL.Agent
RisingTrojan.Generic@AI.99 (RDML:ETXq8391PuQRxZ47xltEZg)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/PossibleThreat
AVGWin32:DropperX-gen [Drp]
Cybereasonmalicious.272936

How to remove MSIL/TrojanDropper.Agent.FOD?

MSIL/TrojanDropper.Agent.FOD removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment