Trojan

What is “Trojan-Downloader.Win32.Bandit.jmo”?

Malware Removal

The Trojan-Downloader.Win32.Bandit.jmo is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Downloader.Win32.Bandit.jmo virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • Expresses interest in specific running processes
  • A process created a hidden window
  • The binary likely contains encrypted or compressed data.
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to create or modify system certificates
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
venoxcontrol.com

How to determine Trojan-Downloader.Win32.Bandit.jmo?


File Info:

crc32: 7874A5DC
md5: 3e184f398397e78d156c203ce449f78b
name: experience2Bcertificate2Bformat2Bfor2Bdriver2Bpdf_aaqx1l3coqaatbecaelofwasal6trkia.exe
sha1: 4a7bfafe85651d9df3126425f4983570463a8b50
sha256: 98045a177630e3460a89c24175a24b8d750d47e9ddd5d236d3646cf3dc73ed01
sha512: fcad519d440cba929a6f49c6d9f372149741860b02927626cbb4a17e525c4b03fc6dea72e9d72f226c54233d6a181fd753a464804925a14873556db8cb9f5582
ssdeep: 98304:oqW+FDM2sLLxLt+K2WDmN72agQxd1V8iok:oqWSMLKKFOH8i5
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

Translation: 0x0219 0x04e4

Trojan-Downloader.Win32.Bandit.jmo also known as:

DrWebTrojan.Siggen8.58817
MicroWorld-eScanTrojan.GenericKD.32772171
FireEyeGeneric.mg.3e184f398397e78d
McAfeeTrojan-FRQV!3E184F398397
MalwarebytesTrojan.MalPack.GS
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Multi.Generic.4!c
SangforMalware
K7AntiVirusTrojan ( 003c36381 )
BitDefenderTrojan.GenericKD.32772171
K7GWTrojan ( 003c36381 )
Cybereasonmalicious.e85651
BitDefenderThetaGen:NN.ZexaF.32517.Wx0@a4bZw9b
SymantecTrojan.Glupteba
APEXMalicious
GDataWin32.Trojan-Downloader.Glupteba.WZI538
KasperskyTrojan-Downloader.Win32.Bandit.jmo
AlibabaTrojanDownloader:Win32/Bandit.e8468f27
RisingTrojan.Kryptik!1.BFC4 (CLASSIC)
Ad-AwareTrojan.GenericKD.32772171
SophosMal/Generic-S
ComodoMalware@#17sk1j5vi7sg3
F-SecureTrojan.TR/AD.GoCloudnet.gcko
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.MultiPlug.wc
Trapminesuspicious.low.ml.score
IkarusTrojan.Win32.Crypt
CyrenW32/Trojan.AHCV-9306
JiangminTrojanDownloader.Bandit.ayu
WebrootW32.Trojan.Gen
AviraTR/AD.GoCloudnet.gcko
MAXmalware (ai score=85)
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.D1F4104B
ZoneAlarmTrojan-Downloader.Win32.Bandit.jmo
MicrosoftTrojan:Win32/GandCrypt.GE!MTB
AhnLab-V3Malware/Win32.RL_Generic.R301699
Acronissuspicious
ALYacTrojan.GenericKD.32772171
VBA32Malware-Cryptor.Limpopo
CylanceUnsafe
PandaTrj/GdSda.A
ESET-NOD32a variant of Win32/Kryptik.GYYS
TrendMicro-HouseCallTROJ_GEN.R002C0DL219
SentinelOneDFI – Suspicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Malicious_Behavior.VEX
AVGFileRepMalware
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_90% (W)
Qihoo-360Win32/Trojan.Downloader.851

How to remove Trojan-Downloader.Win32.Bandit.jmo?

Trojan-Downloader.Win32.Bandit.jmo removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment