Trojan:Win32/Raccoon.MD!MTB

Written by Robert Bailey
If you spectate the alert of Trojan:Win32/Raccoon.MD!MTB detection, it appears that your computer has a problem. All malicious programs are dangerous, with no exceptions. Raccoon is malicious software that targets on grabbing different categories of data from your computer. It applies a lot of hacks to dodge malware detection, and uses secured connections to send data to the command server. The activity of this malware usually results in losing access to your accounts, and compromising your identity. Moreover, some examples can also deliver more malware to the system.
GridinSoft Anti-Malware Review
It is better to prevent, than repair and repent!
When we talk about the intrusion of unfamiliar programs into your computer’s work, the proverb “Forewarned is forearmed” describes the situation as accurately as possible. Gridinsoft Anti-Malware is exactly the tool that is always useful to have in your armory: fast, efficient, up-to-date. It is appropriate to use it as an emergency help at the slightest suspicion of infection.
Gridinsoft Anti-Malware 6-day trial available.
EULA | Privacy Policy | 10% Off Coupon
Subscribe to our Telegram channel to be the first to know about news and our exclusive materials on information security.

Any malware exists with the only target – make money on you1. And the developers of these things are not thinking of morality – they utilize all possible methods. Stealing your personal data, receiving the payments for the banners you watch for them, utilizing your system to mine cryptocurrencies – that is not the full list of what they do. Do you want to be a riding equine? That is a rhetorical question.

What does the notification with Trojan:Win32/Raccoon.MD!MTB detection mean?

The Trojan:Win32/Raccoon.MD!MTB detection you can see in the lower right side is shown to you by Microsoft Defender. That anti-malware program is good at scanning, but prone to be generally unreliable. It is unprotected to malware invasions, it has a glitchy user interface and bugged malware removal features. Thus, the pop-up which says about the Raccoon is just an alert that Defender has actually found it. To remove it, you will likely need to make use of a separate anti-malware program.

Trojan:Win32/Raccoon.MD!MTB found

Microsoft Defender: “Trojan:Win32/Raccoon.MD!MTB”

Having Trojan:Win32/Raccoon.MD!MTB malware on your PC is not a pleasant thing from any point of view. The worst issue is that you will not discover anything wrong. Key trick of any spyware is being as secretive as possible. Some Raccoon samples also can perform self-deletion after gathering all the valuable info available on the PC. Then, it will be almost impossible to uncover the flow of events and figure out how your accounts were hacked. Variants of spyware that aim at long-term action can target the specific folder in the system or file type. After that, files grabbed in that way will be put for sale on the Darknet – at one of its numerous marketplaces with stolen data.

Spyware Summary:

NameRaccoon Spyware
DetectionTrojan:Win32/Raccoon.MD!MTB
DamageSteal personal data contained in the attacked system.
SimilarTrojan:Win32/RaccoonStealer!MSR, Trojan:Win32/Raccoon.SS!MTB
Fix ToolSee If Your System Has Been Affected by Raccoon Spyware

Trojan:Win32/Raccoon.MD!MTB Technical Description

Malware Behaviour
Click to expand
  • SetUnhandledExceptionFilter detected (possible anti-debug);
  • Behavioural detection: Executable code extraction – unpacking;
  • Yara rule detections observed from a process memory dump/dropped files/CAPE;
  • Creates RWX memory;
  • Anomalous file deletion behavior detected (10+);
  • A process attempted to delay the analysis task.;
  • Dynamic (imported) function loading detected;
  • Performs HTTP requests potentially not found in PCAP.;
  • HTTPS URLs from behavior;
  • A named pipe was used for inter-process communication;
  • Enumerates running processes;
  • A process created a hidden window;
  • CAPE extracted potentially suspicious content;
  • Unconventionial language used in binary resources: Serbian;
  • The binary likely contains encrypted or compressed data.;
  • Authenticode signature is invalid;
  • Behavioural detection: Injection (Process Hollowing);
  • Executed a process and injected code into it, probably while unpacking;
  • Writes a potential ransom message to disk;
  • Behavioural detection: Injection (inter-process);
  • Behavioural detection: Transacted Hollowing;
  • Created a process from a suspicious location;
  • Collects and encrypts information about the computer likely to send to C2 server;
  • Installs itself for autorun at Windows startup;
  • STOP ransomware registry artifacts detected;
  • Creates a hidden or system file;
  • Likely virus infection of existing system binary;
  • CAPE detected the STOP malware family;
  • Attempts to modify proxy settings;
  • Creates a copy of itself;
  • Uses suspicious command line tools or Windows utilities;
Alternative detection names
Click to expand
BkavW32.AIDetect.malware2
Elasticmalicious (high confidence)
DrWebTrojan.Siggen17.23546
MicroWorld-eScanTrojan.GenericKDZ.85071
FireEyeGeneric.mg.0b9702d6fdb46f47
CAT-QuickHealRansom.Stop.P5
McAfeePacked-GEE!0B9702D6FDB4
CylanceUnsafe
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0058f6eb1 )
K7GWTrojan ( 0058f6eb1 )
CyrenW32/Kryptik.GAJ.gen!Eldorado
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Kryptik.HOTZ
APEXMalicious
ClamAVWin.Dropper.Generickdz-9939781-0
KasperskyHEUR:Trojan-Ransom.Win32.Stop.gen
BitDefenderTrojan.GenericKDZ.85071
AvastWin32:AceCrypter-O [Cryp]
TencentTrojan-Spy.Win32.Stealer.za
Ad-AwareTrojan.GenericKDZ.85071
EmsisoftTrojan.Crypt (A)
BaiduWin32.Trojan.Kryptik.jm
TrendMicroRansom.Win32.STOP.SMYXCDGTA.hp
McAfee-GW-EditionBehavesLike.Win32.Lockbit.cc
SophosMal/Generic-R + Troj/Krypt-FV
SentinelOneStatic AI – Malicious PE
MicrosoftTrojan:Win32/Raccoon.MD!MTB
GDataWin32.Trojan.Kryptik.RW
CynetMalicious (score: 100)
AhnLab-V3Infostealer/Win.RedLine.R477779
Acronissuspicious
VBA32BScope.TrojanSpy.Stealer
ALYacTrojan.Ransom.Stop
MalwarebytesTrojan.MalPack.GS
RisingTrojan.Generic@AI.100 (RDMK:cmRtazptb29LQK9TKwgYy+OZyo0P)
MAXmalware (ai score=89)
FortinetW32/Kryptik.HOVM!tr
AVGWin32:AceCrypter-O [Cryp]
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_100% (W)

Is Trojan:Win32/Raccoon.MD!MTB dangerous?

As I have pointed out earlier, any malware is threatening. And Trojan:Win32/Raccoon.MD!MTB is not even close to being more annoying than dangerous. The most deceptive quality of this malware is the fact you cannot witness its activity by any means, other than with the use of anti-malware software scanning. And when you are in the dark, hackers who successfully deployed their malware to your system are starting to count the money. Darknet offers numerous opportunities to market malware logs for a hefty sum – especially when these logs are freshly-collected. And you’d better not imagine what will happen to your accounts when other rascals will put their hands on your credentials.

However, situation may have much faster turnover. In some cases, crooks are delivering their virus precisely to the user they are going to steal from. Spyware is invaluable when it comes to collecting login credentials, and some examples target precisely at banking accounts or crypto wallets. One may say, giving spyware a run is the same as sending all your money to fraudsters.

How did I get this virus?

It is not easy to line the sources of malware on your PC. Nowadays, things are mixed up, and distribution tactics used by adware 5 years ago may be used by spyware nowadays. However, if we abstract from the exact spreading method and will think of why it works, the explanation will be pretty simple – low level of cybersecurity knowledge. Individuals press on advertisements on odd sites, open the pop-ups they get in their browsers, call the “Microsoft tech support” believing that the scary banner that states about malware is true. It is important to understand what is legitimate – to stay away from misconceptions when attempting to find out a virus.

Microsoft tech support scam

The example of Microsoft Tech support scam banner

Nowadays, there are two of the most widespread tactics of malware spreading – lure emails and also injection into a hacked program. While the first one is not so easy to avoid – you need to know a lot to recognize a fake – the 2nd one is very easy to solve: just don’t utilize cracked applications. Torrent-trackers and various other providers of “free” applications (which are, actually, paid, but with a disabled license checking) are just a giveaway place of malware. And Trojan:Win32/Raccoon.MD!MTB is just one of them.

How to remove the Trojan:Win32/Raccoon.MD!MTB from my PC?

Trojan:Win32/Raccoon.MD!MTB malware is very hard to eliminate by hand. It stores its documents in multiple locations throughout the disk, and can restore itself from one of the elements. Furthermore, numerous modifications in the registry, networking settings and Group Policies are fairly hard to locate and revert to the original. It is much better to make use of a specific program – exactly, an anti-malware app. GridinSoft Anti-Malware will fit the best for malware removal objectives.

Why GridinSoft Anti-Malware? It is pretty lightweight and has its databases updated nearly every hour. Moreover, it does not have such bugs and weakness as Microsoft Defender does. The combination of these details makes GridinSoft Anti-Malware ideal for removing malware of any kind.

Remove the viruses with GridinSoft Anti-Malware

  • Download and install GridinSoft Anti-Malware. After the installation, you will be offered to perform the Standard Scan. Approve this action.
  • Gridinsoft Anti-Malware during the scan process

  • Standard scan checks the logical disk where the system files are stored, together with the files of programs you have already installed. The scan lasts up to 6 minutes.
  • GridinSoft Anti-Malware scan results

  • When the scan is over, you may choose the action for each detected virus. For all files of Raccoon the default option is “Delete”. Press “Apply” to finish the malware removal.
  • GridinSoft Anti-Malware - After Cleaning
Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

References

  1. Read about malware types on GridinSoft Threat encyclopedia.

About the author

Robert Bailey

I'm Robert Bailey, a passionate Security Engineer with a deep fascination for all things related to malware, reverse engineering, and white hat ethical hacking.

As a white hat hacker, I firmly believe in the power of ethical hacking to bolster security measures. By identifying vulnerabilities and providing solutions, I contribute to the proactive defense of digital infrastructures.

Leave a Reply

Sending