Trojan

Trojan:Win32/Injuke.GNJ!MTB removal instruction

Malware Removal

The Trojan:Win32/Injuke.GNJ!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Injuke.GNJ!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Created a service that was not started
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Injuke.GNJ!MTB?


File Info:

name: 70398D12B25993A3BB20.mlw
path: /opt/CAPEv2/storage/binaries/8dc1f4621d8d7c0494391da51167cb6ba5d01c8b28a6165da013a6891a5175f9
crc32: 2A77BE6B
md5: 70398d12b25993a3bb2083d944605dd8
sha1: 0316baff68625abe5d431e11e643dc86b2d442c2
sha256: 8dc1f4621d8d7c0494391da51167cb6ba5d01c8b28a6165da013a6891a5175f9
sha512: ade9f160bbfbc4c00c9577992a54728c213fcfbaafb1637dab22406d268678009da119cd480d725bfa85444735f4a7fb6c63d3a4e673778bf66003332037d5cd
ssdeep: 49152:m2uS1IN2EST64IQUmbzmwr1WLMWmXDijx9M1bQmGBLcR4RrURY0E:fKN+TKIm0UKXDiAGVfrUlE
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1DEE5339B6D5E887CC979AC7814EAD19D8E77B6B1EBB98C04285ECC002F5375E4C1E324
sha3_384: 7c107edfdfdab126051d0d2fd82b1f4ff4fb819cc2d3a2942c53d81f625ab1c02a4ec525817e62af028c14e119ccbfe0
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 2023-11-28 22:24:26

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: VolumeCRT Setup
FileVersion:
LegalCopyright:
ProductName: VolumeCRT
ProductVersion:
Translation: 0x0000 0x04b0

Trojan:Win32/Injuke.GNJ!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Injuke.16!c
DrWebTrojan.Siggen22.19429
SkyhighBehavesLike.Win32.PUPInstaller.vc
MalwarebytesTrojan.Dropper
ZillyaTrojan.Injuke.Win32.37799
K7AntiVirusTrojan ( 005722f11 )
AlibabaTrojanDropper:Win32/Injuke.3e76e8ad
K7GWTrojan ( 005722f11 )
CrowdStrikewin/malicious_confidence_100% (W)
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
CynetMalicious (score: 99)
APEXMalicious
ClamAVWin.Malware.Injuke-10016425-0
KasperskyTrojan.Win32.Injuke.jxfm
AvastOther:Malware-gen [Trj]
TencentWin32.Trojan.Injuke.Wdkl
F-SecureHeuristic.HEUR/AGEN.1332256
TrendMicroTROJ_GEN.R002C0DLA23
SophosMal/Generic-S
IkarusTrojan-Dropper.Win32.Agent
JiangminTrojan.Ekstak.ciey
VaristW32/Ekstak.IW.gen!Eldorado
AviraHEUR/AGEN.1332256
MicrosoftTrojan:Win32/Injuke.GNJ!MTB
ZoneAlarmTrojan.Win32.Injuke.jxfm
GDataWin32.Trojan.Agent.PKS7EJ
AhnLab-V3Trojan/Win.DownloadAssistant.R621621
McAfeeArtemis!70398D12B259
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R002C0DLA23
MaxSecureTrojan.Malware.220999511.susgen
FortinetW32/Agent.SLC!tr
AVGOther:Malware-gen [Trj]
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Injuke.GNJ!MTB?

Trojan:Win32/Injuke.GNJ!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment