Trojan

How to remove “Trojan:Win32/Rebhip”?

Malware Removal

The Trojan:Win32/Rebhip is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Rebhip virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Trojan:Win32/Rebhip?


File Info:

name: B17CE8BB0883DCF2E3BC.mlw
path: /opt/CAPEv2/storage/binaries/536297246d7f8a477e8d52928e9c0391a5290addb51e729981d60d2089627c12
crc32: F064B4DA
md5: b17ce8bb0883dcf2e3bc95ef4d426e87
sha1: 08fb3cd674183ac995490ffd6ee0fc10015da29d
sha256: 536297246d7f8a477e8d52928e9c0391a5290addb51e729981d60d2089627c12
sha512: 37cbc9ee9ae5132ebedead1d49e37cf3bc470cd223036896d424b256a478b61566ce52904b61db361fc04731fbb6f482b8c355caa4b92782671dd6e5676f25fd
ssdeep: 192:yDhcdpkOLeLGaJGiKX8wRC0QUu3J6Lno0MJ8szX98hgE:y9cjeHjz33J6LngJ8szN8yE
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B9D2F31ADDBC405AE76DCA30FAE7C26B6032BC6E2D301915149D3B292D737F25542B2B
sha3_384: 49128ec02df46ea716865c5e0434532b15e51f229771bc11940901b94ca2829b6ff3ab52ae3c5675929fcd456bb8b3d3
ep_bytes: 6898124000e8eeffffff000000000000
timestamp: 2014-12-18 20:43:58

Version Info:

CompanyName: SpeedyFox
FileDescription: SpeedyFox program
FileVersion: 2.0.8.73
InternalName: SpeedyFox.exe
LegalCopyright: Copyright © 2010-2014 CrystalIDEA Software. All rights reserved.
OriginalFilename: SpeedyFox.exe
ProductName: SpeedyFox
ProductVersion: 2.0.8.73
Translation: 0x0409 0x04e4

Trojan:Win32/Rebhip also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Reconyc.tpT2
Elasticmalicious (high confidence)
DrWebTrojan.Inject3.18526
CynetMalicious (score: 99)
FireEyeGeneric.mg.b17ce8bb0883dcf2
CAT-QuickHealTrojan.VBCrypt.MF.2189
SkyhighTrojan-FQXX!B17CE8BB0883
ALYacTrojan.Injector.VB.CA
Cylanceunsafe
ZillyaTrojan.Reconyc.Win32.4851
SangforSuspicious.Win32.Save.vb
CrowdStrikewin/malicious_confidence_100% (D)
AlibabaTrojan:Win32/Reconyc.f55907b9
K7GWTrojan ( 00550f7a1 )
K7AntiVirusTrojan ( 00550f7a1 )
ArcabitTrojan.Injector.VB.CA
BitDefenderThetaGen:NN.ZevbaF.36608.bm0@aChjB!lO
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Injector.BRSX
APEXMalicious
KasperskyTrojan.Win32.Reconyc.dian
BitDefenderTrojan.Injector.VB.CA
NANO-AntivirusTrojan.Win32.Reconyc.dzhrmd
MicroWorld-eScanTrojan.Injector.VB.CA
AvastWin32:Broban-N [Trj]
RisingTrojan.Injector!8.C4 (TFE:3:PyIkuI30kiP)
TACHYONTrojan/W32.VB-Reconyc.28672
SophosTroj/Agent-BBXC
F-SecureTrojan.TR/Beebone.opanjhy
VIPRETrojan.Injector.VB.CA
Trapminemalicious.moderate.ml.score
EmsisoftTrojan.Injector.VB.CA (B)
SentinelOneStatic AI – Suspicious PE
JiangminTrojan.Reconyc.dka
VaristW32/Trojan.XZCR-1066
AviraTR/Beebone.opanjhy
Antiy-AVLTrojan/Win32.Injector.blmo
Kingsoftmalware.kb.a.802
XcitiumTrojWare.Win32.Injector.BSB@8c92qz
MicrosoftTrojan:Win32/Rebhip
ZoneAlarmTrojan.Win32.Reconyc.dian
GDataTrojan.Injector.VB.CA
GoogleDetected
AhnLab-V3Trojan/Win32.Llac.C681577
McAfeeTrojan-FQXX!B17CE8BB0883
MAXmalware (ai score=82)
MalwarebytesMalware.AI.872250192
TencentMalware.Win32.Gencirc.10b34270
IkarusTrojan-Ransom.CTBLocker
MaxSecureTrojan.Malware.7911137.susgen
FortinetW32/Injector.BLMO!tr
AVGWin32:Broban-N [Trj]
Cybereasonmalicious.674183
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Rebhip?

Trojan:Win32/Rebhip removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment