Trojan

What is “Trojan:Win32/Redline.A!MTB”?

Malware Removal

The Trojan:Win32/Redline.A!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Redline.A!MTB virus can do?

  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • CAPE detected the MetaStealer malware family
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Trojan:Win32/Redline.A!MTB?


File Info:

name: 083EC102D3C3E745D984.mlw
path: /opt/CAPEv2/storage/binaries/9a2f15ef6438df44074160f2011be55bcf6373a0deecf4b85bacc571cc8f48c2
crc32: DEFE39DE
md5: 083ec102d3c3e745d9847adeafa6d4db
sha1: 49e518c095c9b3e9dd83d870018cfbbb216b27ee
sha256: 9a2f15ef6438df44074160f2011be55bcf6373a0deecf4b85bacc571cc8f48c2
sha512: 787c9ba50e568da48783528b23f30646738983cbe96b5be4712df0c4d407670a7c49fcc7c9c805fddd4e4acc95ded776f54ef7e51441266fef3bf7d0e2d66f42
ssdeep: 24576:SlG6qqgrdGAtbc41kIk3T+qh9LqhF8fZ1B4P6xwU7DqrDh:fqgrdGAZcikzh9WhF8B1xaDh
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T146558D337C8C8171DFE150F906ACAB24C16FE0A48765CEC31696A6EE9F145F12B316DA
sha3_384: c2b82734a5b318978b683edda6e14a59bdb05423f321b17ecf8c277b74d429ede7e24b0dad22dbcc709c86ddead74665
ep_bytes: e9792b0400e9ac6e0600e9cd4b0100e9
timestamp: 2023-09-10 13:20:58

Version Info:

0: [No Data]

Trojan:Win32/Redline.A!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Stealer.12!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Ser.Zusy.4585
CAT-QuickHealTrojan.RedlineRI.S31026060
SkyhighBehavesLike.Win32.Generic.th
ALYacGen:Variant.Ser.Zusy.4585
MalwarebytesGeneric.Malware.AI.DDS
ZillyaBackdoor.Agent.Win32.92294
SangforInfostealer.Win32.Kryptik.Vzs9
K7AntiVirusTrojan ( 005aaa221 )
AlibabaTrojanSpy:Win32/Stealer.2fb61ec9
K7GWTrojan ( 005aaa221 )
Cybereasonmalicious.2d3c3e
VirITTrojan.Win32.Genus.TBJ
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HVAC
APEXMalicious
McAfeeGenericRXAA-AA!083EC102D3C3
ClamAVWin.Packed.Pwsx-10008461-0
KasperskyHEUR:Trojan-Spy.Win32.Stealer.pef
BitDefenderGen:Variant.Ser.Zusy.4585
NANO-AntivirusTrojan.Win32.Stealer.kaeokr
AvastWin32:CrypterX-gen [Trj]
EmsisoftGen:Variant.Ser.Zusy.4585 (B)
F-SecureHeuristic.HEUR/AGEN.1366785
DrWebTrojan.PWS.RedLineNET.6
VIPREGen:Variant.Ser.Zusy.4585
TrendMicroTROJ_GEN.R002C0DB124
FireEyeGen:Variant.Ser.Zusy.4585
SophosMal/Generic-S
IkarusTrojan.Win32.Redline
JiangminBackdoor.Agent.mmc
GoogleDetected
AviraHEUR/AGEN.1366785
VaristW32/Kryptik.KPY.gen!Eldorado
Antiy-AVLTrojan/Win32.Kryptik
KingsoftWin32.HeurC.KVMH008.a
MicrosoftTrojan:Win32/Redline.A!MTB
XcitiumMalware@#1i2o6gtml1ii4
ArcabitTrojan.Ser.Zusy.D11E9
ZoneAlarmHEUR:Trojan-Spy.Win32.Stealer.pef
GDataGen:Variant.Ser.Zusy.4585
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.CrypterX-gen.R604819
MAXmalware (ai score=85)
VBA32BScope.TrojanPSW.RedLine
Cylanceunsafe
PandaTrj/GdSda.A
TrendMicro-HouseCallTROJ_GEN.R002C0DB124
TencentMalware.Win32.Gencirc.10bf22e0
YandexTrojan.Kryptik!J1G0TGtd+Ns
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.218383271.susgen
FortinetW32/Kryptik.HUBU!tr
AVGWin32:CrypterX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)
alibabacloudMalware

How to remove Trojan:Win32/Redline.A!MTB?

Trojan:Win32/Redline.A!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment