Malware

Troj/Mdrop-JVT removal

Malware Removal

The Troj/Mdrop-JVT is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Troj/Mdrop-JVT virus can do?

  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Troj/Mdrop-JVT?


File Info:

name: 23A9B4E4D73701EE6444.mlw
path: /opt/CAPEv2/storage/binaries/9c1c527a826d16419009a1b7797ed20990b9a04344da9c32deea00378a6eeee2
crc32: 7EF1FF5E
md5: 23a9b4e4d73701ee644402d447d34c03
sha1: 3a5aae193a679c36fde3ea6a55168427c8a27d52
sha256: 9c1c527a826d16419009a1b7797ed20990b9a04344da9c32deea00378a6eeee2
sha512: 87a112f756e6be005b8bb449ae21924dc145f90be0f172967f811f82ba18024fd4d4e7ea86492b767a60fdda01d9edd94677f0d5b491893429c8d45e1c786d64
ssdeep: 6144:ofjgtcER8E5RttLhNujl4ifIDl2ucIvaKJJOnYPAiFTQvG+gwRXtR:o7oR8EnttFeSykOnYPiS
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T151A458B7CCA8C79DC8B3D3F2681A79C065F878FDE64EE57E81595A81764F2C18089807
sha3_384: 327bd7a241a66de91ca824e17784f009971cfadef84592108637c7e28c26c77baa702cf6ba452703ec787f7c32a260ea
ep_bytes: ff250020400000000000000000000000
timestamp: 2023-05-14 10:45:31

Version Info:

Translation: 0x0000 0x04b0
FileDescription:
FileVersion: 1.0.0.0
InternalName: Xxut.exe
LegalCopyright:
OriginalFilename: Xxut.exe
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

Troj/Mdrop-JVT also known as:

BkavW32.Common.9BEE9534
LionicTrojan.Win32.DOTHETUK.4!c
DrWebTrojan.Siggen20.51868
MicroWorld-eScanGen:Variant.MSIL.Cassiopeia.4
FireEyeGeneric.mg.23a9b4e4d73701ee
SkyhighBehavesLike.Win32.Generic.gc
McAfeeArtemis!23A9B4E4D737
Cylanceunsafe
ZillyaDropper.Agent.Win32.544969
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 00596b4f1 )
AlibabaTrojan:MSIL/XWormRAT.91f018d9
K7GWTrojan ( 00596b4f1 )
Cybereasonmalicious.93a679
ArcabitTrojan.MSIL.Cassiopeia.4
BitDefenderThetaAI:Packer.6883A9FC1F
VirITTrojan.Win32.MSIL_Heur.A
SymantecTrojan Horse
Elasticmalicious (high confidence)
ESET-NOD32a variant of MSIL/TrojanDropper.Agent.FOV
CynetMalicious (score: 100)
APEXMalicious
KasperskyHEUR:Trojan.MSIL.DOTHETUK.gen
BitDefenderGen:Variant.MSIL.Cassiopeia.4
AvastWin32:RATX-gen [Trj]
TencentMalware.Win32.Gencirc.13beda87
TACHYONTrojan/W32.DN-DOTHETUK.463360
EmsisoftGen:Variant.MSIL.Cassiopeia.4 (B)
F-SecureTrojan.TR/Dropper.Gen
VIPREGen:Variant.MSIL.Cassiopeia.4
TrendMicroRansom.MSIL.EGOGEN.YXDEO
Trapminemalicious.high.ml.score
SophosTroj/Mdrop-JVT
IkarusTrojan.MSIL.Injector
WebrootW32.Trojan.Gen
VaristW32/MSIL_Agent.DVW.gen!Eldorado
AviraTR/Dropper.Gen
Antiy-AVLTrojan/MSIL.DOTHETUK
KingsoftMSIL.Trojan.DOTHETUK.gen
MicrosoftTrojan:MSIL/XWormRAT.A!MTB
ViRobotTrojan.Win.Z.Agent.463360.B
ZoneAlarmHEUR:Trojan.MSIL.DOTHETUK.gen
GDataGen:Variant.MSIL.Cassiopeia.4
GoogleDetected
AhnLab-V3Trojan/Win.Generic.C5108156
ALYacTrojan.Ransom.Filecoder
MAXmalware (ai score=100)
MalwarebytesTrojan.Crypt.MSIL.Generic
PandaTrj/GdSda.A
TrendMicro-HouseCallRansom.MSIL.EGOGEN.YXDEO
RisingDropper.Agent!1.E8A6 (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.73691240.susgen
FortinetMSIL/Agent.FOV!tr
AVGWin32:RATX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Troj/Mdrop-JVT?

Troj/Mdrop-JVT removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment