Trojan

Trojan:Win32/ICLoader.RPX!MTB information

Malware Removal

The Trojan:Win32/ICLoader.RPX!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/ICLoader.RPX!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Behavioural detection: Transacted Hollowing
  • Created a service that was not started
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/ICLoader.RPX!MTB?


File Info:

name: AD7E134A7140F96DF9AF.mlw
path: /opt/CAPEv2/storage/binaries/f54be15ba335647c3f4fceb0b2bb3b387e4b28770aaf689afd1ce2cc952532de
crc32: 3BBB57ED
md5: ad7e134a7140f96df9af00338c014390
sha1: 6e16cb4dcc65989c1dfed2a91860eed03c7e234e
sha256: f54be15ba335647c3f4fceb0b2bb3b387e4b28770aaf689afd1ce2cc952532de
sha512: 2ad6d1e182ba2002d3c8392db4b7c56b8a4fc1a1b31ce5460aee0b5c5117634b7a16b14fecfd3ff069f5fde301d07eea5d56a3416956106dbcb2727ff6b9df26
ssdeep: 98304:CxHuoJAeZBGyf5ezguZGJx7eShXOHQbAMkTB5WElE:MBGOIyfMkJlhzmLu
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T10926339CE57520F4DA25DF7A5E24840213A7727167F9608833CDAD6DEF08DDA1388B3A
sha3_384: f6da15d4695864bb9c72b1719c7a107f6dc012da7be360fb727320be32cdbc190638db1c22efa7e1d293769622886550
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 2023-11-25 20:37:43

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: BusinessTV Setup
FileVersion:
LegalCopyright:
ProductName: BusinessTV
ProductVersion:
Translation: 0x0000 0x04b0

Trojan:Win32/ICLoader.RPX!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Injuke.16!c
SkyhighBehavesLike.Win32.ObfuscatedPoly.rc
McAfeeArtemis!AD7E134A7140
Cylanceunsafe
ZillyaTrojan.Injuke.Win32.37847
K7AntiVirusTrojan ( 005722f11 )
AlibabaTrojanDropper:Win32/Injuke.55f1076e
K7GWTrojan ( 005722f11 )
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 99)
APEXMalicious
ClamAVWin.Malware.Agen-10015693-0
KasperskyTrojan.Win32.Injuke.jozh
AvastOther:Malware-gen [Trj]
TencentWin32.Trojan.Injuke.Ncnw
F-SecureHeuristic.HEUR/AGEN.1332570
DrWebTrojan.Siggen22.16075
TrendMicroTROJ_GEN.R002C0DL723
SophosMal/Generic-S
JiangminTrojan.Ekstak.ciey
VaristW32/Trojan.XPNM-5448
AviraHEUR/AGEN.1332570
MicrosoftTrojan:Win32/ICLoader.RPX!MTB
ZoneAlarmTrojan.Win32.Injuke.jozh
GDataWin32.Trojan.Agent.OXI3XG
AhnLab-V3Trojan/Win.DownloadAssistant.R621621
MalwarebytesTrojan.Injector
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R002C0DL723
YandexTrojan.Injuke!MwW0JSZJm1Q
IkarusTrojan-Dropper.Win32.Agent
MaxSecureTrojan.Malware.220958546.susgen
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS

How to remove Trojan:Win32/ICLoader.RPX!MTB?

Trojan:Win32/ICLoader.RPX!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment