Backdoor: Win32/Mokes.A Description
The Backdoor: Win32/Mokes.A malware is a Backdoor-Trojan that may be dispersed among PC users that run Windows 7 and later versions via spam emails laid with a corrupted executable. The Backdoor: Win32/Mokes.A malware may utilize code injection into processes of Google Chrome, Mozilla Firefox and Internet Explorer. The Mokes Backdoor Trojan may substitute files in the Program Files and AppData directories to enable its activities and be connect to the Internet uninterruptedly. Files like mozillacache.exe, nacl32.exe, nacl64.exe, hpprint.exe, hpscan.exe, hpqcore.exe and AcroBroker.exe that do not feature a valid digital signature may be used by Backdoor: Win32/Mokes.A to allow third parties to operate your PC without notice. The Mokes Backdoor-Trojan is packed with the Yoda's Crypter and UPX compression to go under the radar of most AV scanners.
Once installed, the Backdoor: Win32/Mokes.A malware may connect to the 18.104.22.168 IP address and Jessiman901.com to report a successful infiltration to its operators. The Mokes Backdoor-Trojan is similar to threats like Jukbot and Fynloski and may edit the system settings that govern your proxy configuration and port status to open ports 77, 135, 259, 512 and 514 that can be used for remote code execution and control. Backdoor: Win32/Mokes.A may be used to record video from your Web can, keyboard input and upload data from your hard drives to a remote server. You should do well to keep in mind that the Mokes Backdoor-Trojan may be copied to removable media and infect other computers. The Mokes Backdoor-Trojan is a resource-hungry malware that may slow down the infected PC and cause programs to crash due to the lack of system resources. You should install a trusted anti-malware suite on your PC to block the Backdoor: Win32/Mokes.A malware and unwanted modifications to your port configuration.
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.