Trojan

Trojan:Win32/Netwire.RPY!MTB removal guide

Malware Removal

The Trojan:Win32/Netwire.RPY!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Netwire.RPY!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Netwire.RPY!MTB?


File Info:

name: 115E05F432576E06AD9F.mlw
path: /opt/CAPEv2/storage/binaries/d8f8fda0dc9e176dcacf1acf50196088ed0441c6f92111f710dc8c4eac0f32f1
crc32: 430272FE
md5: 115e05f432576e06ad9f5ece17ef351c
sha1: 8f2b3e1ed85a16a66f653e20a044ea47fe2073ef
sha256: d8f8fda0dc9e176dcacf1acf50196088ed0441c6f92111f710dc8c4eac0f32f1
sha512: a86e3b8fdabc32918cb26ef71fc0c307cfb9ac19b5b0cd5aec4571b983a543c2220c1ecd1afac04d13b7b976b30f3eff946d56cce549e3f5e9fbc0f6842c24a1
ssdeep: 98304:DSBGoYZGOTHpfWM/gZ1GxHTevOVr48OEyoome5n6FORg:DmG98OTH1gMHdr4ZEyZtn7i
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T13426333237A9CAB6C9A16131AC1F77F852EAE326636618C7B305D91D0C88D97E077CC5
sha3_384: 2e1cf6d9acd2b5b3cbd53ded174ba3946e557664e168fa6baf0fbb9042e426a01643c2fe537d69faa292f7c96c7ebfe0
ep_bytes: 558bec6aff6898c24100680691410064
timestamp: 2019-02-21 16:00:00

Version Info:

CompanyName: Igor Pavlov
FileDescription: 7z Setup SFX
FileVersion: 19.00
InternalName: 7zS.sfx
LegalCopyright: Copyright (c) 1999-2018 Igor Pavlov
OriginalFilename: 7zS.sfx.exe
ProductName: 7-Zip
ProductVersion: 19.00
Translation: 0x0409 0x04b0

Trojan:Win32/Netwire.RPY!MTB also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Jaik.85571
ClamAVWin.Malware.Ursu-9864205-0
SangforSuspicious.Win32.Save.ins
K7AntiVirusTrojan ( 00596ade1 )
K7GWTrojan ( 00596ade1 )
CyrenW32/Kryptik.ITT.gen!Eldorado
ESET-NOD32a variant of Win32/GenKryptik.FZDE
CynetMalicious (score: 100)
KasperskyTrojan.VBS.Agent.bbj
BitDefenderGen:Variant.Jaik.85571
NANO-AntivirusTrojan.Win32.Kryptik.jsjzdr
AvastWin32:Trojan-gen
RisingTrojan.Undefined!8.1327C (TFE:5:DrbQsccsEYT)
EmsisoftGen:Variant.Jaik.85571 (B)
F-SecureHeuristic.HEUR/AGEN.1315171
DrWebBackDoor.Siggen2.4515
VIPREGen:Variant.Jaik.85571
McAfee-GW-EditionBehavesLike.Win32.Dropper.rc
FireEyeGen:Variant.Jaik.85571
IkarusTrojan.Win32.Krypt
JiangminBackdoor.Agent.lui
AviraHEUR/AGEN.1315171
Antiy-AVLTrojan/Win32.SGeneric
MicrosoftTrojan:Win32/Netwire.RPY!MTB
ArcabitTrojan.Jaik.D14E43
ZoneAlarmTrojan.VBS.Agent.bbj
GDataGen:Variant.Jaik.85571
GoogleDetected
Acronissuspicious
VBA32BScope.Backdoor.Agent
ALYacGen:Variant.Jaik.85571
MAXmalware (ai score=88)
MalwarebytesGeneric.Malware.AI.DDS
FortinetW32/GenKryptik.FZDE!tr
BitDefenderThetaGen:NN.ZexaF.36318.U8Z@au5NRWp
AVGWin32:Trojan-gen
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_90% (D)

How to remove Trojan:Win32/Netwire.RPY!MTB?

Trojan:Win32/Netwire.RPY!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment