Trojan

Trojan:Win32/ICLoader.RPX!MTB information

Malware Removal

The Trojan:Win32/ICLoader.RPX!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/ICLoader.RPX!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Created a service that was not started
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/ICLoader.RPX!MTB?


File Info:

name: F672F166ABDBC0C98A0F.mlw
path: /opt/CAPEv2/storage/binaries/fff2849beaec0df505f905086f37b7a869d1cdcec04a8a7679320ea41c12ab74
crc32: 7606333E
md5: f672f166abdbc0c98a0f9f1c6646d5d8
sha1: 14e9fc95267de92ee23f328eb987f147f3704ac6
sha256: fff2849beaec0df505f905086f37b7a869d1cdcec04a8a7679320ea41c12ab74
sha512: 785a6d0e6de1b6823e77c3871af63651d3ee1134c51dd3536dd6324d12f5755b13e238416cc5a3f390590a2a8ac1e8a122e0cac58db51b374d78db5886c597be
ssdeep: 98304:fxHuoJAeZBGyf5ezguZGJx7eShXOHQbAMkTB5WElE:5BGOIyfMkJlhzmLu
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T13C26339CE57520F4DA25DF7A5E24840213A7727167F9608833CDAD6DEF08DDA1388B3A
sha3_384: e4a87485e8ec5a89afa482b23241b3264f8e1cbfa8058507d3fb95d90cdd03b8ceb0bf187eb7f36b0088ca879ef9689e
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 2023-11-25 22:48:40

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: BusinessTV Setup
FileVersion:
LegalCopyright:
ProductName: BusinessTV
ProductVersion:
Translation: 0x0000 0x04b0

Trojan:Win32/ICLoader.RPX!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Injuke.16!c
CynetMalicious (score: 99)
SkyhighBehavesLike.Win32.BadFile.rc
Cylanceunsafe
K7AntiVirusTrojan ( 005722f11 )
AlibabaTrojanDropper:Win32/Injuke.6573adb4
K7GWTrojan ( 005722f11 )
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
APEXMalicious
ClamAVWin.Malware.Agen-10015693-0
KasperskyTrojan.Win32.Injuke.jpdz
NANO-AntivirusTrojan.Win32.Injuke.ketoif
AvastOther:Malware-gen [Trj]
TencentWin32.Trojan.Injuke.Cgow
F-SecureHeuristic.HEUR/AGEN.1332570
DrWebTrojan.Siggen22.16075
ZillyaTrojan.Injuke.Win32.37847
TrendMicroTROJ_GEN.R002C0DL723
SophosMal/Generic-S
IkarusTrojan-Dropper.Win32.Agent
JiangminTrojan.Ekstak.ciey
VaristW32/Trojan.XPNM-5448
AviraHEUR/AGEN.1332570
KingsoftWin32.Trojan.Injuke.jpdz
MicrosoftTrojan:Win32/ICLoader.RPX!MTB
ZoneAlarmTrojan.Win32.Injuke.jpdz
GDataWin32.Trojan.Agent.XPW5A7
AhnLab-V3Trojan/Win.DownloadAssistant.R621621
McAfeeArtemis!F672F166ABDB
MalwarebytesTrojan.Injector
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R002C0DL723
MaxSecureTrojan.Malware.220860644.susgen
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS

How to remove Trojan:Win32/ICLoader.RPX!MTB?

Trojan:Win32/ICLoader.RPX!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment