Trojan

Trojan:Win32/Redline.CCER!MTB malicious file

Malware Removal

The Trojan:Win32/Redline.CCER!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Redline.CCER!MTB virus can do?

  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid

How to determine Trojan:Win32/Redline.CCER!MTB?


File Info:

name: 09EA67FA4AD245EEB417.mlw
path: /opt/CAPEv2/storage/binaries/cf0e25fb0aeb175f6a9c7d85ca576625b0f6b55fd311a8c56fed9c78b3ca298a
crc32: 34140CE7
md5: 09ea67fa4ad245eeb41719b90293f257
sha1: b58fdb0f7dd798e5d2f4295cd1c96d7996e8bc76
sha256: cf0e25fb0aeb175f6a9c7d85ca576625b0f6b55fd311a8c56fed9c78b3ca298a
sha512: dbaf3f2319b69c43dd0ab54d41666850731303d2c8e7b3c91a721dd956e34c461532f91c2a1b060a1b3d689fca003f3ebcf3586b0b5e77436ff3a0e176f3305a
ssdeep: 12288:hm4zcCDaHhNmNwTOHKzE0E5GkDy/2yRoYhdZpau4NN19gupDZvKtFDAM:NRDazmNwTuKzE0E5nD3yJrZpe0
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T148158D2138D09176EDF220B743ECFA2643ADE0B4072516DF06D857EED7606C27B3669A
sha3_384: 35aa7b8deef3d70a2536ecabdaa804673788d631c5721500d1a4230520288993e7c34dbbd25d503e2eac75cd1f43f0d5
ep_bytes: e9b01a0400e939690600e92ba10400e9
timestamp: 2023-10-26 22:22:13

Version Info:

0: [No Data]

Trojan:Win32/Redline.CCER!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Redline.l!c
Elasticmalicious (high confidence)
DrWebTrojan.Siggen21.51652
MicroWorld-eScanGen:Heur.Kysler.1
FireEyeGen:Heur.Kysler.1
SkyhighBehavesLike.Win32.Sabsik.dm
Cylanceunsafe
ZillyaTrojan.Kryptik.Win32.4347845
SangforTrojan.Win32.Lumma.swkaa
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojanSpy:Win32/Redline.81a7bb71
K7GWTrojan ( 005add031 )
K7AntiVirusTrojan ( 005add031 )
BitDefenderThetaAI:Packer.DC7A2F2B1E
VirITTrojan.Win32.Genus.TWC
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HVLV
APEXMalicious
ClamAVWin.Packed.Pwsx-10012424-0
KasperskyHEUR:Trojan-Spy.Win32.Stealer.pef
BitDefenderGen:Heur.Kysler.1
NANO-AntivirusTrojan.Win32.Injurer.kctfxo
SUPERAntiSpywareTrojan.Agent/Gen-Kryptik
TencentTrojan.Win32.Injurer.hg
EmsisoftGen:Heur.Kysler.1 (B)
GoogleDetected
F-SecureTrojan.TR/AD.SmokeLoader.ngeqn
VIPREGen:Heur.Kysler.1
TrendMicroTROJ_GEN.R002C0DBF24
SophosTroj/Krypt-ABY
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Injurer.t
VaristW32/Kryptik.KNN.gen!Eldorado
AviraTR/AD.SmokeLoader.ngeqn
Antiy-AVLTrojan/Win32.Kryptik.huyh
KingsoftWin32.Trojan.Injurer.gen
MicrosoftTrojan:Win32/Redline.CCER!MTB
ArcabitTrojan.Kysler.1
ZoneAlarmHEUR:Trojan-Spy.Win32.Stealer.pef
GDataWin32.Trojan.PSE.IMBV54
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.R618281
McAfeeRDN/sabsik
MAXmalware (ai score=85)
DeepInstinctMALICIOUS
VBA32BScope.TrojanPSW.RedLine
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Chgt.AD
TrendMicro-HouseCallTROJ_GEN.R002C0DBF24
RisingBackdoor.Convagent!8.123DC (TFE:5:fvDR64zeDjF)
YandexTrojan.Injector!IucF63gOpHc
IkarusTrojan.Win32.Redline
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Injector.ETFD!tr
AVGWin32:PWSX-gen [Trj]
Cybereasonmalicious.a4ad24
AvastWin32:PWSX-gen [Trj]
alibabacloudTrojan:Win/Injurer.gen

How to remove Trojan:Win32/Redline.CCER!MTB?

Trojan:Win32/Redline.CCER!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment