Trojan

Should I remove “Trojan:Win32/RedLineStealer.N!MTB”?

Malware Removal

The Trojan:Win32/RedLineStealer.N!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/RedLineStealer.N!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • CAPE detected the RedLine malware family
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/RedLineStealer.N!MTB?


File Info:

name: 9CDD8909ADDEF59C88D5.mlw
path: /opt/CAPEv2/storage/binaries/8dd2b999955088c9b1766d18b9952597364fe6c043b93950f335f9a04b2d9987
crc32: 3A893BE2
md5: 9cdd8909addef59c88d54f7581042ad6
sha1: 41c75c4726c38b98d1643d74cc93b31317ac6ea0
sha256: 8dd2b999955088c9b1766d18b9952597364fe6c043b93950f335f9a04b2d9987
sha512: f0a9baf96c0b8ff91bc428902d68f40256c9e25f1e2007b731b97e3dac2bf03c2e5e648d8a18e96ce16ea414fa5caaf026bba4982c198e05afe6c16d55c4d9c0
ssdeep: 6144:ZFny4gBVQ0rjN+vRGyTj/KaexoNh+z6oLcl1L35wKwX:38BJGjSamoscl1L3qK
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T179344922D29A856EF7B98C795B71BC5436F230C861C1269BB1CD3E180F1C75FAC1AAD4
sha3_384: 1dbc8a4d20a69058de2f620e9047223cd1b18cb599d8c9067b236e82f43e2871e8d3319c56e4f551da184dde9c9dac86
ep_bytes: e8db260000e9a4feffff8bff558bec8b
timestamp: 2023-08-20 10:06:00

Version Info:

Comments: Shrubby predestination bitch retaliates inquorate cocain
CompanyName: Blowpipes
FileDescription: Enumerable escalated rediscovered
FileVersion: 5.260.200.4
InternalName: Denture
LegalCopyright: Copyright © Chilly redeposition
LegalTrademarks: Disclaimer depressive harshly farad remittances
OriginalFilename: Dissociating
ProductName: Castor
ProductVersion: 5.260.200.4
Translation: 0x081a 0x081a

Trojan:Win32/RedLineStealer.N!MTB also known as:

BkavW32.AIDetectMalware
DrWebTrojan.PWS.Stealer.37076
CynetMalicious (score: 100)
FireEyeGeneric.mg.9cdd8909addef59c
Cylanceunsafe
VIPREGen:Variant.Zusy.482832
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a9f911 )
K7GWTrojan ( 005a9f911 )
Cybereasonmalicious.726c38
BitDefenderThetaGen:NN.ZexaF.36350.oq0@aenMq@mi
CyrenW32/Kryptik.KKK.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.HUKP
AvastWin32:PWSX-gen [Trj]
KasperskyHEUR:Trojan-Spy.Win32.Stealer.gen
BitDefenderGen:Variant.Zusy.482832
MicroWorld-eScanGen:Variant.Zusy.482832
EmsisoftGen:Variant.Zusy.482832 (B)
F-SecureTrojan.TR/Crypt.Agent.bvwoc
ZillyaTrojan.GenKryptik.Win32.227571
McAfee-GW-EditionArtemis
Trapminemalicious.high.ml.score
SophosTroj/Steal-DQZ
GDataGen:Variant.Zusy.482832
AviraTR/Crypt.Agent.bvwoc
ZoneAlarmHEUR:Trojan-Spy.Win32.Stealer.gen
MicrosoftTrojan:Win32/RedLineStealer.N!MTB
GoogleDetected
AhnLab-V3Spyware/Win.Hpdyre.R492527
VBA32BScope.Backdoor.Agent
MAXmalware (ai score=82)
MalwarebytesTrojan.Crypt
PandaTrj/Genetic.gen
APEXMalicious
RisingBackdoor.Agent!8.C5D (TFE:5:yehDq6lK8IB)
SentinelOneStatic AI – Malicious PE
FortinetW32/Kryptik.HUIM!tr
AVGWin32:PWSX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan:Win32/RedLineStealer.N!MTB?

Trojan:Win32/RedLineStealer.N!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment