Trojan

Trojan:Win32/Tnega.V!MTB removal tips

Malware Removal

The Trojan:Win32/Tnega.V!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Tnega.V!MTB virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Reads data out of its own binary image
  • A process created a hidden window
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Deletes its original binary from disk
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Steals private information from local Internet browsers
  • Spoofs its process name and/or associated pathname to appear as a legitimate process
  • Creates a hidden or system file
  • Creates a copy of itself
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
locandasolagna.xyz

How to determine Trojan:Win32/Tnega.V!MTB?


File Info:

crc32: 23744C53
md5: bc8521a1c7b091a78022af29eb1a07b1
name: BC8521A1C7B091A78022AF29EB1A07B1.mlw
sha1: 0cd85e07b11a153e1704bc819eb3c7734588a28a
sha256: 1d06d38bbab4dda2f2db81c18d557cfbd15ddecd5272329325041546063d5bb9
sha512: 2a18da22668137e907f806fceb32515a69f1bebe760323e47cb2b145e7f0563523457aad337230c15448345267780b740b93925dea56fb6e1aec401f69c9499c
ssdeep: 6144:0sGSIFZNnSVLGzuXPXxF8LPveTNBmDVr0tvfmUzrb/CK6lTM:qSCNSVL8qXxFZBmAnmA/CBpM
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Baas geo-information
FileVersion: 1.10.0.0
CompanyName: Baas geo-information
Comments: http://baasgeo.github.io/mapproxywindows/
ProductName: MapProxy
ProductVersion: 1.10.0.0
FileDescription: MapProxy Installer
Translation: 0x0000 0x04e4

Trojan:Win32/Tnega.V!MTB also known as:

K7AntiVirusTrojan ( 0057d0641 )
CynetMalicious (score: 99)
CAT-QuickHealBackdoor.Androm
ALYacTrojan.GenericKD.37010634
CylanceUnsafe
SangforTrojan.Win32.Vobfus.gen
AlibabaTrojan:Win32/Tnega.7d9545d1
K7GWTrojan ( 0057d0641 )
CyrenW32/Wacapew.M.gen!Eldorado
SymantecTrojan Horse
ESET-NOD32multiple detections
APEXMalicious
AvastWin32:Malware-gen
KasperskyHEUR:Trojan.Win32.Vobfus.gen
BitDefenderTrojan.GenericKD.37010634
MicroWorld-eScanTrojan.GenericKD.37010634
Ad-AwareTrojan.GenericKD.37010634
SophosMal/Generic-S + Troj/Fareit-LSB
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_FRS.VSNW19E21
McAfee-GW-EditionRDN/Generic BackDoor
FireEyeTrojan.GenericKD.37010634
EmsisoftTrojan.GenericKD.37010634 (B)
AviraTR/AD.LokiBot.jplfa
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Tnega.V!MTB
ArcabitTrojan.Generic.D234BCCA
GDataTrojan.GenericKD.37010634
TACHYONTrojan/W32.InfoStealer.391363
McAfeeRDN/Generic BackDoor
MAXmalware (ai score=83)
VBA32Backdoor.Androm
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_FRS.VSNW19E21
YandexTrojan.Igent.bVVzi7.4
IkarusTrojan.NSIS.Agent
FortinetW32/Kryptik.AKX!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove Trojan:Win32/Tnega.V!MTB?

Trojan:Win32/Tnega.V!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment