Trojan

Trojan:Win32/RedLineStealer.PJ!MTB removal tips

Malware Removal

The Trojan:Win32/RedLineStealer.PJ!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/RedLineStealer.PJ!MTB virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Kannada
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Detects Sandboxie through the presence of a library
  • Detects Avast Antivirus through the presence of a library
  • Behavioural detection: Injection (inter-process)
  • Created a process from a suspicious location
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization

How to determine Trojan:Win32/RedLineStealer.PJ!MTB?


File Info:

name: 7E0E1B7A17C96466CF76.mlw
path: /opt/CAPEv2/storage/binaries/6c8581006a081cdea93ef4ffd3da57f6513e6885996c7fcf460045e04933a0a9
crc32: D065AD70
md5: 7e0e1b7a17c96466cf7687221103d75e
sha1: a8bd184faa1dfbaaad90c6e700c49472e8c673cf
sha256: 6c8581006a081cdea93ef4ffd3da57f6513e6885996c7fcf460045e04933a0a9
sha512: a5b49946f55a57fff41df4ec01634b11c391dda9506fbcd22ba4e452b92a78d6544f5dc850fc9dcd5d6865c580fc362ba3ef6091520774a3d99d63d0545bd265
ssdeep: 3072:YXGhAkFYO9fpY6VUhS5QzkC+kWQBhpHxVQRdKmPXyIDhzQxNPb0KIVggjcGkNIV8:keFF5SwGldxjQmmPXyIDaXb0p7ITsqR
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T13634BEE47293C472F05339308826CBA16A7A7812FB70858BF7742B3E1E757E05AB6355
sha3_384: fea2a821bf4b1045f3814e52df2a566581967bf328daeff5cb1d61d6dd0ea77e0c43a6d7327064b761a52234fd2ba0ab
ep_bytes: e8c2780000e989feffff8bff558bec83
timestamp: 2021-12-30 01:36:41

Version Info:

FileVersions: 17.26.2.32
Copyrighz: Copyright (C) 2022, pozkarte
ProjectVersion: 2.82.22.61

Trojan:Win32/RedLineStealer.PJ!MTB also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
FireEyeGeneric.mg.7e0e1b7a17c96466
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
CyrenW32/Kryptik.GVX.gen!Eldorado
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ClamAVWin.Malware.Azorult-9949206-0
KasperskyVHO:Backdoor.Win32.Mokes.gen
TencentTrojan-ransom.Win32.Stop.16000284
McAfee-GW-EditionBehavesLike.Win32.Generic.dh
Trapminemalicious.high.ml.score
SophosML/PE-A + Mal/Agent-AWV
APEXMalicious
MicrosoftTrojan:Win32/RedLineStealer.PJ!MTB
CynetMalicious (score: 100)
Acronissuspicious
MalwarebytesTrojan.MalPack.GS
IkarusTrojan.Crypter
RisingTrojan.Generic@AI.100 (RDML:r9KW6ubKZgi1ZmB/c8mQ/w)
SentinelOneStatic AI – Malicious PE
Cybereasonmalicious.faa1df

How to remove Trojan:Win32/RedLineStealer.PJ!MTB?

Trojan:Win32/RedLineStealer.PJ!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment