Trojan

Trojan:Win32/Redline.GNR!MTB removal tips

Malware Removal

The Trojan:Win32/Redline.GNR!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Redline.GNR!MTB virus can do?

  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • CAPE detected the MetaStealer malware family
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Trojan:Win32/Redline.GNR!MTB?


File Info:

name: 1867635C120C6BC8DCA4.mlw
path: /opt/CAPEv2/storage/binaries/65a89965a891c3a25d1513b7b7f6f833611ff1428eaf8d00d38640b26fbcf6d8
crc32: AAF973F5
md5: 1867635c120c6bc8dca417c8228f2e59
sha1: 191bae555c58154935579c35de401dbedbb0f456
sha256: 65a89965a891c3a25d1513b7b7f6f833611ff1428eaf8d00d38640b26fbcf6d8
sha512: a7684fd189656369657231005e5458ca9f00ad0bcf0780c30cb722b1e3e3def227c594d24e52e017868bf0f9514b6eebee82a917f96ffbc4a19e94e8b2d8481c
ssdeep: 24576:0p+2dAiItf+BVXjsYJRj3c1yNzK9zXcPn/jlAin1WM1q1aSOp6QPlJMA:EItf+BVAY73NODcPn/jlAin1WM1q1aS0
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T100459E21FFA080B1ED9211FB41DCF5258A9DB27417658BDB1AC407EE9721BE43F324A6
sha3_384: e1e0e15fd8b3fe25a1adcf6226ee3eb553ae8343aaddd043aaa84c1f5fa5bc06e35a32fbfb3c359de9cafb31d3905e21
ep_bytes: e9ea280400e97b270700e95daf0400e9
timestamp: 2023-11-01 12:30:39

Version Info:

0: [No Data]

Trojan:Win32/Redline.GNR!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Redline.i!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Heur.Kysler.1
ClamAVWin.Packed.Pwsx-10012424-0
FireEyeGen:Heur.Kysler.1
SkyhighBehavesLike.Win32.Generic.th
Cylanceunsafe
SangforInfostealer.Win32.Redline.Vpu8
K7AntiVirusTrojan ( 005add031 )
AlibabaTrojanPSW:Win32/Redline.02cb291d
K7GWTrojan ( 005add031 )
CrowdStrikewin/malicious_confidence_100% (W)
ArcabitTrojan.Kysler.1
BitDefenderThetaGen:NN.ZexaF.36744.kDW@aGf0Q5i
VirITTrojan.Win32.GenusT.DTKV
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HVLV
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan-PSW.Win32.Stealerc.pef
BitDefenderGen:Heur.Kysler.1
NANO-AntivirusTrojan.Win32.Inject4.kczvob
AvastWin32:TrojanX-gen [Trj]
TencentTrojan-Spy.Win32.Stealer.har
TACHYONTrojan-Spy/W32.InfoStealer.1216000
EmsisoftGen:Heur.Kysler.1 (B)
F-SecureHeuristic.HEUR/AGEN.1366785
DrWebTrojan.PWS.Stealer.38044
TrendMicroTrojanSpy.Win32.REDLINE.YXDKAZ
SophosTroj/Krypt-ABY
IkarusTrojan.Win32.Redline
JiangminTrojan.PSW.Stealerc.mh
GoogleDetected
AviraHEUR/AGEN.1366785
Antiy-AVLTrojan/Win32.Kryptik.huyh
MicrosoftTrojan:Win32/Redline.GNR!MTB
ZoneAlarmHEUR:Trojan-PSW.Win32.Stealerc.pef
GDataWin32.Trojan.PSE.12W6N6R
VaristW32/Kryptik.KNN.gen!Eldorado
AhnLab-V3Trojan/Win.RedLine.C5535794
McAfeeGenericRXWM-OX!1867635C120C
MAXmalware (ai score=81)
VBA32TrojanSpy.Stealer
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallTrojanSpy.Win32.REDLINE.YXDKAZ
RisingBackdoor.Agent!8.C5D (TFE:1:6GqAaQTPo2I)
SentinelOneStatic AI – Suspicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Injector.ETFD!tr
AVGWin32:TrojanX-gen [Trj]
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Redline.GNR!MTB?

Trojan:Win32/Redline.GNR!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment