Trojan

How to remove “Trojan:Win32/Redline.GMH!MTB”?

Malware Removal

The Trojan:Win32/Redline.GMH!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Redline.GMH!MTB virus can do?

  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • CAPE detected the RedLine malware family
  • Anomalous binary characteristics
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Redline.GMH!MTB?


File Info:

name: 18558101082D3D9DD095.mlw
path: /opt/CAPEv2/storage/binaries/ca9a53642fbfd28d06437780b6e480af7ca9007340f1cdabdc39c0fd54e0a896
crc32: D939A4A6
md5: 18558101082d3d9dd0959b2504f1456f
sha1: 85f1822fe00baa0e7e49a2a848f174b4c65d219a
sha256: ca9a53642fbfd28d06437780b6e480af7ca9007340f1cdabdc39c0fd54e0a896
sha512: 865da52287f266cb7c45de2f563a7ff805e3e8adfcf6cfe3fa1431b41370efb21c2cc63f7a6a01d8d013d34bccae50bb255030a0fd5832b8d370341d4c904071
ssdeep: 24576:eyrFXflzuanEzo0LfKArhLrEJH+0jd+i9dM60DuW:1zuanEzNLC041VdMUW
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1DB957C3D7B869265ECE600FA86FC7921C11EE0B01B2789E7D68517EF86105E13B3578E
sha3_384: ed1b910ff9f7c9de622b3b1dce85e980398a8a660305d64cfb104fe3fe92a2dc5ec3524d138abe45587bb0a7c1b2f9b6
ep_bytes: e93f5d0400e976a00600e9174d0100e9
timestamp: 2023-08-31 14:23:53

Version Info:

0: [No Data]

Trojan:Win32/Redline.GMH!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Stealer.12!c
MicroWorld-eScanGen:Variant.Lazy.384967
ClamAVWin.Packed.Pwsx-10008461-0
FireEyeGen:Variant.Lazy.384967
ALYacGen:Variant.Lazy.384967
MalwarebytesSpyware.RedLineStealer
ZillyaTrojan.Stealer.Win32.141924
SangforInfostealer.Win32.Kryptik.Vicy
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojanSpy:Win32/Stealer.2dc95856
K7GWTrojan ( 005aaa221 )
K7AntiVirusTrojan ( 005aaa221 )
VirITTrojan.Win32.GenusT.DQLR
CyrenW32/Stealer.EY.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.HUBU
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan-Spy.Win32.Stealer.pef
BitDefenderGen:Variant.Lazy.384967
NANO-AntivirusTrojan.Win32.Stealer.jziccz
AvastWin32:CrypterX-gen [Trj]
TencentMalware.Win32.Gencirc.10bf1a29
SophosMal/Generic-S
F-SecureTrojan.TR/AD.RedLineSteal.xdwsi
DrWebTrojan.PWS.RedLineNET.6
VIPREGen:Variant.Lazy.384967
TrendMicroTrojanSpy.Win32.REDLINE.YXDIEZ
McAfee-GW-EditionBehavesLike.Win32.Generic.tt
EmsisoftGen:Variant.Lazy.384967 (B)
GDataGen:Variant.Lazy.384967
JiangminTrojanSpy.Stealer.ailb
Webroot
AviraTR/AD.RedLineSteal.xdwsi
Antiy-AVLTrojan/Win32.Sabsik
ArcabitTrojan.Lazy.D5DFC7
ZoneAlarmHEUR:Trojan-Spy.Win32.Stealer.pef
MicrosoftTrojan:Win32/Redline.GMH!MTB
GoogleDetected
AhnLab-V3Infostealer/Win.Injection.C5479143
McAfeeArtemis!18558101082D
MAXmalware (ai score=80)
VBA32BScope.TrojanPSW.RedLine
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallTrojanSpy.Win32.REDLINE.YXDIEZ
RisingBackdoor.Agent!8.C5D (TFE:5:csL1B5VX1TF)
YandexTrojan.Kryptik!K1xurUBGYTU
IkarusTrojan.Win32.Redline
MaxSecureTrojan.Malware.73793603.susgen
FortinetW32/Kryptik.HUBU!tr
BitDefenderThetaGen:NN.ZexaF.36738.0PW@a0F!fXei
AVGWin32:CrypterX-gen [Trj]
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Redline.GMH!MTB?

Trojan:Win32/Redline.GMH!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment