Trojan

About “Trojan:Win32/Barys.GMA!MTB” infection

Malware Removal

The Trojan:Win32/Barys.GMA!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Barys.GMA!MTB virus can do?

  • Sample contains Overlay data
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Trojan:Win32/Barys.GMA!MTB?


File Info:

name: 749C50BC8AD5E6A13BA7.mlw
path: /opt/CAPEv2/storage/binaries/f63474874105b03a9893db15cde05fed1099f122b426447921131c4e0f0e7e45
crc32: 55347D80
md5: 749c50bc8ad5e6a13ba77822055debbd
sha1: 5baf1b1d311e8dbdfc54400a19dc7398a79a1976
sha256: f63474874105b03a9893db15cde05fed1099f122b426447921131c4e0f0e7e45
sha512: fb4ea08eb196e8f9356421c41ebe5190ab38e1ff767b8d99bc7aa946ec876e414a3154ea28b9c21387c4f7ba53e71dec83f8d3424f4e035e931ffe33addfd6ab
ssdeep: 24576:Y3p5nVJRXqw6h6XFRbf0ezEM4dmv5BJtOtEM4dmv58:+p7PXqw8o7bf0ezj425zUtj4258
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1A8F4CF87B26CEE11C8393B3F156DF306A982A9AFEA29784D5518830F0563DF7D08B654
sha3_384: 0fd8e40c3d7c0aae7f8629003e8da7340b2cf8eff159e19ad2bcf90b8749c8058b44db562a5ca6028720ab14523ed1e9
ep_bytes: b5ba3bf8e5e38f7fe032b6ee2271de54
timestamp: 1971-05-16 00:00:00

Version Info:

CompanyName: Wayne J. Radburn
FileDescription: PE/COFF File Viewer
FileVersion: 0.9.9.0
InternalName: PEview
LegalCopyright: Copyright© 1997-2011 Wayne J. Radburn
OriginalFilename: PEview.exe
ProductName: PEview
ProductVersion: 0.9.9.0
Translation: 0x0409 0x04e4

Trojan:Win32/Barys.GMA!MTB also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Lazy.439579
ClamAVWin.Packed.Razy-9786051-0
SkyhighBehavesLike.Win32.RAHack.bc
McAfeeTrojan-FVOQ!749C50BC8AD5
MalwarebytesGeneric.Malware.AI.DDS
VIPREGen:Variant.Lazy.439579
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 0001b3411 )
K7GWTrojan ( 0001b3411 )
Cybereasonmalicious.d311e8
ArcabitTrojan.Lazy.D6B51B
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Kryptik_AGen.BGV
APEXMalicious
CynetMalicious (score: 100)
KasperskyVHO:Trojan.Win32.Injuke.gen
BitDefenderGen:Variant.Lazy.439579
NANO-AntivirusTrojan.Win32.Kryptik.foobtk
AvastWin32:TrojanX-gen [Trj]
TencentTrojan.Win32.Kryptik.gify
EmsisoftGen:Variant.Lazy.439579 (B)
F-SecureTrojan.TR/Patched.Ren.Gen
DrWebTrojan.PackedENT.192
ZillyaTrojan.Kryptik.Win32.3766585
SophosMal/Inject-GJ
IkarusTrojan.Patched
WebrootW32.Trojan.Gen
GoogleDetected
AviraTR/Patched.Ren.Gen
Antiy-AVLGrayWare/Win32.Kryptik.gifq
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Barys.GMA!MTB
ZoneAlarmVHO:Trojan.Win32.Injuke.gen
GDataWin32.Trojan.PSE.109W4IM
VaristW32/Dacic.E.gen!Eldorado
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36680.W83@aSUsTC
ALYacGen:Variant.Lazy.439579
TACHYONTrojan/W32.Selfmod
VBA32Trojan.Khalesi
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.B34D (CLASSIC)
YandexTrojan.Agent!RRuFJhSd6qY
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:TrojanX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan:Win32/Barys.GMA!MTB?

Trojan:Win32/Barys.GMA!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment