Spy Trojan

TrojanSpy:Win32/Lokibot!MTB information

Malware Removal

The TrojanSpy:Win32/Lokibot!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What TrojanSpy:Win32/Lokibot!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Created a process from a suspicious location
  • Steals private information from local Internet browsers
  • Collects and encrypts information about the computer likely to send to C2 server
  • Spoofs its process name and/or associated pathname to appear as a legitimate process
  • Collects information to fingerprint the system

How to determine TrojanSpy:Win32/Lokibot!MTB?


File Info:

name: 9DDE2F9D6E034B01E5FD.mlw
path: /opt/CAPEv2/storage/binaries/a0db5c96a78bf0f1785819cad807caa178dc01cdcf0481d0fd704fb911910363
crc32: E721A7B8
md5: 9dde2f9d6e034b01e5fddd6e343e5a1b
sha1: 54e4cb0e54bfa455a0e370d3c3a6b0de1b908682
sha256: a0db5c96a78bf0f1785819cad807caa178dc01cdcf0481d0fd704fb911910363
sha512: 367698af311503b7777578392fa9ce815c64457c67d6c16f224b67b59d8ecd049506aad8d3d510255268f4d1c1f2341650968798290ea7015a8225b721a20ba5
ssdeep: 6144:twMmssvDVi+RRuoY7rwLoQstYc1OnluQakKrd8BgCIvTvdqYRV:3g7uoYvJQAYIPkKriiCIvXRV
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1ECA401257498C8A7DBE935740F42CAB84379EE0D2E41454B67F4BF9F39FD2AB9818081
sha3_384: b5632aa3060fd10ff57df5a4339c3f544821a8eecc112135f634af34eb090032c674b5761e0c20ff2414422173258839
ep_bytes: 81ec8001000053555633db57895c2418
timestamp: 2008-10-10 21:48:57

Version Info:

0: [No Data]

TrojanSpy:Win32/Lokibot!MTB also known as:

LionicTrojan.Win32.Androm.m!c
Elasticmalicious (high confidence)
DrWebTrojan.Inject4.24778
MicroWorld-eScanTrojan.GenericKD.38634262
FireEyeTrojan.GenericKD.38634262
CAT-QuickHealTrojan.SpynoonRI.S26308914
ALYacTrojan.GenericKD.38634262
CylanceUnsafe
SangforTrojan.Win32.Formbook.gen
CrowdStrikewin/malicious_confidence_100% (W)
K7GWTrojan ( 0058d42d1 )
K7AntiVirusTrojan ( 0058d42d1 )
BitDefenderThetaGen:NN.ZedlaF.34182.eu4@aORYDdoi
VirITTrojan.Win32.NSISDrp.DDJ
CyrenW32/Injector.ATK.gen!Eldorado
SymantecPacked.NSISPacker!g10
ESET-NOD32Win32/PSW.Fareit.L
APEXMalicious
Paloaltogeneric.ml
CynetMalicious (score: 100)
BitDefenderTrojan.GenericKD.38634262
AvastWin32:PWSX-gen [Trj]
TencentWin32.Backdoor.Agent.Hykc
EmsisoftTrojan.GenericKD.38634262 (B)
ComodoMalware@#1nfe6nry1n0dn
TrendMicroBackdoor.Win32.ANDROM.USMANAK22
SophosMal/Generic-S
IkarusWin32.SuspectCrc
AviraTR/AD.LokiBot.jktqf
MicrosoftTrojanSpy:Win32/Lokibot!MTB
ViRobotBackdoor.Win32.S.Agent.449684
GDataTrojan.GenericKD.38634262
AhnLab-V3Spyware/Win.Generic.C4924866
MAXmalware (ai score=81)
VBA32Trojan.Sabsik.FL
MalwarebytesMalware.AI.4250568548
TrendMicro-HouseCallBackdoo.26D25373
RisingTrojan.Injector!8.C4 (CLOUD)
YandexTrojan.Igent.bXkNsK.11
SentinelOneStatic AI – Suspicious PE
FortinetW32/Kryptik.EQXP!tr
AVGWin32:PWSX-gen [Trj]
PandaTrj/CI.A

How to remove TrojanSpy:Win32/Lokibot!MTB?

TrojanSpy:Win32/Lokibot!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment