Trojan

Trojan:Win32/Redline.GNR!MTB removal instruction

Malware Removal

The Trojan:Win32/Redline.GNR!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Redline.GNR!MTB virus can do?

  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid

How to determine Trojan:Win32/Redline.GNR!MTB?


File Info:

name: 299BA88A355F1B8E709A.mlw
path: /opt/CAPEv2/storage/binaries/84c0a211213227ee1eb4ec49d75ae952e8830b5f0123c5b67a820a3890191484
crc32: E8731BFB
md5: 299ba88a355f1b8e709a3c095255e6f4
sha1: f6f77d9c4e81a7704580a7017214e8fd8489d680
sha256: 84c0a211213227ee1eb4ec49d75ae952e8830b5f0123c5b67a820a3890191484
sha512: 11ea4293df1e008d1b64de4b7405065f74feea8c822cabfde303a673dbed5b5866a7ddcde455eaf655359ca3a0a125ae8dcf337ee20033032871a37976ff57d8
ssdeep: 12288:ubc03u2dASlpetf+BVVpsYlHYBPTCqAbmxoRj3cB/RUbu9cdTSjBjqJycOU+dm:L0+2dASetf+BVzsGIoRj3cBW
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T12A45AF3178C45572EEE320B647ECFA69426DD4B0035805EB22DB37EED770AC16B3259A
sha3_384: 66b132d89589e5392611210c71721cae7b195e37dfd2090a154754e307f22cfa61579358abffa66a1ca06a7b395f0c19
ep_bytes: e9ea280400e97b270700e95daf0400e9
timestamp: 2023-11-02 09:49:04

Version Info:

0: [No Data]

Trojan:Win32/Redline.GNR!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Redline.i!c
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Stealer.38044
MicroWorld-eScanGen:Variant.Ser.Zusy.4711
FireEyeGen:Variant.Ser.Zusy.4711
SkyhighBehavesLike.Win32.Smokeloader.th
ALYacGen:Variant.Ser.Zusy.4711
MalwarebytesTrojan.MalPack.RND.Generic
SangforInfostealer.Win32.Agent.V26q
K7AntiVirusTrojan ( 005ac7d11 )
BitDefenderGen:Variant.Ser.Zusy.4711
K7GWTrojan ( 005ac7d11 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZexaF.36792.hDW@aqvRfpc
VirITTrojan.Win32.GenusT.DTKV
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HUYH
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Pwsx-10012424-0
KasperskyHEUR:Trojan-PSW.Win32.Stealerc.pef
AlibabaTrojanPSW:Win32/Redline.37a83119
NANO-AntivirusTrojan.Win32.Inject4.kczvob
ViRobotTrojan.Win.Z.Ser.1165312
TencentMalware.Win32.Gencirc.10bf42a5
TACHYONTrojan-Spy/W32.InfoStealer.1165312.B
SophosTroj/Krypt-ABY
F-SecureTrojan.TR/AD.Nekark.egwns
VIPREGen:Variant.Ser.Zusy.4711
TrendMicroTROJ_GEN.R011C0DK623
EmsisoftGen:Variant.Ser.Zusy.4711 (B)
SentinelOneStatic AI – Suspicious PE
JiangminTrojan.PSW.Stealerc.mh
VaristW32/Kryptik.KNN.gen!Eldorado
AviraTR/AD.Nekark.egwns
Antiy-AVLTrojan/Win32.Kryptik
KingsoftWin32.Trojan-PSW.Stealerc.pef
MicrosoftTrojan:Win32/Redline.GNR!MTB
ArcabitTrojan.Ser.Zusy.D1267
ZoneAlarmHEUR:Trojan-PSW.Win32.Stealerc.pef
GDataWin32.Trojan.PSE.12W6N6R
GoogleDetected
AhnLab-V3Trojan/Win.RedLine.R620138
VBA32TrojanSpy.Stealer
MAXmalware (ai score=85)
DeepInstinctMALICIOUS
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R011C0DK623
RisingBackdoor.Agent!8.C5D (TFE:1:6GqAaQTPo2I)
YandexTrojan.Kryptik!6p+3MuRet4g
IkarusTrojan.Win32.Redline
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Injector.ETFD!tr
AVGWin32:TrojanX-gen [Trj]
AvastWin32:TrojanX-gen [Trj]

How to remove Trojan:Win32/Redline.GNR!MTB?

Trojan:Win32/Redline.GNR!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment