Trojan

Trojan:MSIL/AgentTesla.CJB!MTB removal guide

Malware Removal

The Trojan:MSIL/AgentTesla.CJB!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:MSIL/AgentTesla.CJB!MTB virus can do?

  • The binary likely contains encrypted or compressed data.

How to determine Trojan:MSIL/AgentTesla.CJB!MTB?


File Info:

crc32: 4DE97634
md5: 3ea35b1b33aa1f532d9884a89bd4d7b8
name: 3EA35B1B33AA1F532D9884A89BD4D7B8.mlw
sha1: 32f09102e03892ce8e249808c69fc6e608c1f187
sha256: 16da91f32f3af972103801f5b2cc0f566843ad97a7ec20621f2138faa7da66f9
sha512: 0f84bc5c0a5254a45297060b3aa6b22324e6b93ecfefd4c4df7af316e7b0fa6f8e509719cf89bc4eb1f4b20c5db7d7f8785eff71d39b340beca22ff34932b5e5
ssdeep: 12288:wWJ/HK7zSCPuaj5cBcn/YP6r56B71riNHFwZ3Pe6/nD0lmkFN9xsL:wWgOCfqBM//d6l1riNv64VNTM
type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows

Version Info:

0: [No Data]

Trojan:MSIL/AgentTesla.CJB!MTB also known as:

CrowdStrikewin/malicious_confidence_70% (D)
Cybereasonmalicious.2e0389
CyrenW32/MSIL_Troj.AHY.gen!Eldorado
APEXMalicious
CynetMalicious (score: 100)
SophosML/PE-A
ComodoHeur.Corrupt.PE@1z141z3
FireEyeGeneric.mg.3ea35b1b33aa1f53
MicrosoftTrojan:MSIL/AgentTesla.CJB!MTB
IkarusTrojan-Spy.Agent

How to remove Trojan:MSIL/AgentTesla.CJB!MTB?

Trojan:MSIL/AgentTesla.CJB!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment