Backdoor

Backdoor:Win32/Lotok.GNP!MTB removal

Malware Removal

The Backdoor:Win32/Lotok.GNP!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor:Win32/Lotok.GNP!MTB virus can do?

  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Icelandic
  • Authenticode signature is invalid

How to determine Backdoor:Win32/Lotok.GNP!MTB?


File Info:

name: C9AEDC3974DF984EBA6A.mlw
path: /opt/CAPEv2/storage/binaries/d90758e161028899d420bd2066679586cd9d01a59a6f3657fe1e15fa980e4987
crc32: D1322F1C
md5: c9aedc3974df984eba6ad47c639449a5
sha1: 71666176cf35189ab408e1eb45153845ad11fe15
sha256: d90758e161028899d420bd2066679586cd9d01a59a6f3657fe1e15fa980e4987
sha512: 93743ab20cd5de3c6052af3424c02a437f91dc6d7b517e1749504d2120f43b16e9c630498a6d85ab92e9b1a57cc085342ed8c6889c611e365fbbaaca2cc6cbd2
ssdeep: 384:jNjdnFDjDlKyfVLfp/+ERw72Q30BkofgdxqGoKWe/JbGptRB:jNjdBrLfp/BQ30Xfgd0hJIbGptRB
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1BEE22A15B68B48D1F514D2B00EB76B76AF32A8E5DF00A3AB8785DD2D18371815D3238F
sha3_384: 0602dad3755f3b1be96b81667030b4d381428e5b817aff209af3bf2bc6cb07f77d7b9926d3a3591242dc99a186b32326
ep_bytes: 558bec6aff6830494000688639400064
timestamp: 2023-07-12 13:50:50

Version Info:

CompanyName:
FileDescription: ColorPickerDemo Microsoft 基础类应用程序
FileVersion: 1, 0, 0, 1
InternalName: ColorPickerDemo
LegalCopyright: 版权所有 (C) 2001
LegalTrademarks:
OriginalFilename: ColorPickerDemo.EXE
ProductName: ColorPickerDemo 应用程序
ProductVersion: 1, 0, 0, 1
Translation: 0x0804 0x04b0

Backdoor:Win32/Lotok.GNP!MTB also known as:

LionicTrojan.Win32.Lotok.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.476811
FireEyeGeneric.mg.c9aedc3974df984e
CAT-QuickHealTrojan.GenericRI.S30657943
SkyhighRDN/Generic BackDoor
McAfeeRDN/Generic BackDoor
MalwarebytesTrojan.Crypt
VIPREGen:Variant.Zusy.476811
SangforBackdoor.Win32.Lotok.Vi7j
K7AntiVirusTrojan ( 005a4a0b1 )
BitDefenderGen:Variant.Zusy.476811
K7GWTrojan ( 005a4a0b1 )
CrowdStrikewin/malicious_confidence_100% (W)
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Agent.VHW
APEXMalicious
KasperskyHEUR:Backdoor.Win32.Lotok.gen
AlibabaBackdoor:Win32/Lotok.4a1d7242
NANO-AntivirusTrojan.Win32.Lotok.jybugk
RisingBackdoor.Gh0st!1.E916 (CLASSIC)
SophosMal/Generic-S
F-SecureTrojan.TR/Agent.ykuac
DrWebTrojan.DownLoader45.61096
ZillyaBackdoor.Lotok.Win32.2979
TrendMicroTROJ_GEN.R002C0DGT23
Trapminemalicious.high.ml.score
EmsisoftTrojan.Crypt (A)
IkarusTrojan.Win32.Agent
GoogleDetected
AviraTR/Agent.ykuac
VaristW32/Agent.GSP.gen!Eldorado
Antiy-AVLTrojan[Backdoor]/Win32.Lotok
MicrosoftBackdoor:Win32/Lotok.GNP!MTB
ArcabitTrojan.Zusy.D7468B
ZoneAlarmHEUR:Backdoor.Win32.Lotok.gen
GDataGen:Variant.Zusy.476811
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.MalwareX-gen.R592197
VBA32BScope.Backdoor.Lotok
ALYacGen:Variant.Zusy.476811
MAXmalware (ai score=100)
DeepInstinctMALICIOUS
Cylanceunsafe
PandaTrj/GdSda.A
TrendMicro-HouseCallTROJ_GEN.R002C0DGT23
TencentTrojan.Win32.Agent_yh.16001055
YandexTrojan.Agent!eHdp6mS56MQ
MaxSecureTrojan.Malware.102820574.susgen
FortinetW32/Agent.VHW!tr
AVGWin32:MalwareX-gen [Trj]
Cybereasonmalicious.6cf351
AvastWin32:MalwareX-gen [Trj]

How to remove Backdoor:Win32/Lotok.GNP!MTB?

Backdoor:Win32/Lotok.GNP!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment