Trojan

Trojan:Win32/Redline.GMX!MTB (file analysis)

Malware Removal

The Trojan:Win32/Redline.GMX!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Redline.GMX!MTB virus can do?

  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • CAPE detected the RedLine malware family
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Redline.GMX!MTB?


File Info:

name: F1494798F31C8BE7B245.mlw
path: /opt/CAPEv2/storage/binaries/fe87c160acbd37767668d0f25ac5865affa49e425e24b23d54ef8d5e69bac93e
crc32: 73675CAA
md5: f1494798f31c8be7b2450f57fd2f08da
sha1: facbb0102cca712bce50a970b0e2f764f5a5716c
sha256: fe87c160acbd37767668d0f25ac5865affa49e425e24b23d54ef8d5e69bac93e
sha512: 157e36290a4b2b5e1d78cc2a98a9f2c63544bc588ee6d8784bc3362bc45686d34ca9b902ce2023f8889df65ac627965b738b16c4a29c55d2968e18f5905e46b1
ssdeep: 12288:Sd+BX+xFOFYIN8ySqBJt5qS8sLIx7Vj4dVPazRugkIg+/scqCk3O59iJ:J0OFYW8ySqBvKs0pF4d6Fucc+b6
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T16D458DE5B9C18172DDA750FB83DCBA67019CD47547270ACF86AC3AEEC6143C2AA33456
sha3_384: efaccac87b617fd2c37fb970cdf37be4c1a8ba30124ab5e0755014e20f181e0910ea443299e8cb2d6eec50a37c678e7f
ep_bytes: e9d5b70100e9f91a0700e94bfd0400e9
timestamp: 2023-11-26 08:34:13

Version Info:

0: [No Data]

Trojan:Win32/Redline.GMX!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Stealer.12!c
MicroWorld-eScanGen:Variant.Mint.Zard.1
FireEyeGen:Variant.Mint.Zard.1
SkyhighBehavesLike.Win32.Generic.th
McAfeeGenericRXAA-AA!F1494798F31C
Cylanceunsafe
ZillyaTrojan.Kryptik.Win32.4385462
K7AntiVirusTrojan ( 005add031 )
AlibabaTrojanSpy:Win32/Redline.8b69d7b4
K7GWTrojan ( 005add031 )
ArcabitTrojan.Mint.Zard.1
BitDefenderThetaGen:NN.ZexaF.36608.iDW@aKL@xsc
VirITTrojan.Win32.GenusT.DTYB
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.HVNG
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Pwsx-10012424-0
KasperskyHEUR:Trojan-Spy.Win32.Stealer.gen
BitDefenderGen:Variant.Mint.Zard.1
NANO-AntivirusTrojan.Win32.Stealer.kehdle
AvastWin32:PWSX-gen [Trj]
TencentMalware.Win32.Gencirc.13f8af1c
TACHYONTrojan-Spy/W32.InfoStealer.1191936
EmsisoftGen:Variant.Mint.Zard.1 (B)
F-SecureTrojan.TR/AD.RedLineSteal.iybaj
DrWebTrojan.Inject4.64948
VIPREGen:Variant.Mint.Zard.1
TrendMicroTROJ_GEN.R002C0DL223
SophosMal/Generic-S
IkarusTrojan.Win32.Redline
JiangminTrojanSpy.Stealer.ajlz
VaristW32/Kryptik.KYF.gen!Eldorado
AviraTR/AD.RedLineSteal.iybaj
Antiy-AVLTrojan/Win32.Kryptik
MicrosoftTrojan:Win32/Redline.GMX!MTB
ZoneAlarmHEUR:Trojan-Spy.Win32.Stealer.gen
GDataGen:Variant.Mint.Zard.1
GoogleDetected
AhnLab-V3Trojan/Win.Generic.C5553599
VBA32BScope.Backdoor.Agent
ALYacGen:Variant.Mint.Zard.1
MAXmalware (ai score=80)
MalwarebytesTrojan.Injector
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R002C0DL223
RisingBackdoor.Agent!8.C5D (TFE:5:FI2gQdvqmYP)
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Kryptik.HUYH!tr
AVGWin32:PWSX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan:Win32/Redline.GMX!MTB?

Trojan:Win32/Redline.GMX!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment