Skip to main content
Skip to main content
Published Aug 16, 2022 | Updated Mar 09, 2026

Trojan:Win32/RedLine.MC!MTB

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Trojan:Win32/RedLine.MC!MTB is a credential theft application compiled from the Microsoft .NET Framework. It first appeared in March 2020 and is sold through a Malware-as-a-Service arrangement. Buyers pay approximately 100 United States dollars to receive a customized binary and credentials for a web-based administrative panel. Redline extracts saved web browser credentials, credit card autofill data, cryptocurrency wallet files, and session tokens for Discord, Telegram, and Steam. It compresses this data and transmits it to a command-and-control (C2) server through Windows Communication Foundation channels. 

The Malware-as-a-Service model is central to RedLine’s persistence. Each customer runs their own distribution campaigns. These campaigns have included phishing emails themed around public health emergencies, malicious GitHub repositories maintained by coordinated networks of fake accounts, and fraudulent browser update pages that trick users into running PowerShell commands. Law enforcement actions have seized some servers, but the structure of the model, where the service provider supplies the tool, and the customers' handle delivery has kept the malware in circulation. Affected organizations face data theft and subsequent account compromise from credentials sold in criminal marketplaces. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Redline family.  

  • Isolate the device from all networks immediately. Disconnect Ethernet cables, deactivate Wi-Fi adapters through the Windows network settings, and turn off Bluetooth. This stops active data exfiltration and prevents the malware from receiving remote threat actor commands. 
  • Open Registry Editor and navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run. Look for value entries with file paths in %AppData% or %Temp% that were created around the estimated infection time. Delete those entries. 
  • Open the Task Scheduler. Examine the task list for entries that run binaries from %AppData% or %Temp%. Check the trigger conditions and the creation date. Deactivate and delete these tasks. 
  • Delete all malicious binaries identified during the scan from their locations in %AppData% and %Temp%. Open Windows Security, navigate to Virus and threat protection settings, and remove any unauthorized exclusion paths listed under Exclusions. 
  • From a separate, known-clean device, change the passwords for all sensitive accounts. Start with the Microsoft account, Google account, primary email account, financial service accounts, and corporate VPN credentials. 
  • For each online service, navigate to the security settings page and revoke all active sessions and signed-in devices. This action invalidates session cookies that have been exfiltrated and are now being used by the threat actor. 
  • If the authenticator application or the recovery codes for multi-factor authentication were stored on the compromised device, rotate the multi-factor authentication seeds. Generate new recovery codes and store them on a clean device. 
  • Open each browser installed on the remediated device. Navigate to the settings menu and clear all saved passwords, cookies, site data, and autofill entries. Do not restore this data from browser sync. 

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts. 

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help. 

Follow us