Written by Robert Bailey
If you spectate the alert of Trojan:Win32/Raccoon.RH!MTB detection, it seems that your PC has a problem. All malicious programs are dangerous, with no deviations. Raccoon is malicious software that targets on stealing different types of data from your computer. It applies a lot of stunts to dodge malware detection, and uses secured connections to send data to the command server. The activity of this malware generally ends up with losing access to your accounts, and compromising your identity. Moreover, some samples are also able to deliver other malicious programs to the system.
GridinSoft Anti-Malware Review
It is better to prevent, than repair and repent!
When we talk about the intrusion of unfamiliar programs into your computer’s work, the proverb “Forewarned is forearmed” describes the situation as accurately as possible. Gridinsoft Anti-Malware is exactly the tool that is always useful to have in your armory: fast, efficient, up-to-date. It is appropriate to use it as an emergency help at the slightest suspicion of infection.
Gridinsoft Anti-Malware 6-day trial available.
EULA | Privacy Policy | Gridinsoft
Subscribe to our Telegram channel to be the first to know about news and our exclusive materials on information security.

Any kind of malware exists with the only target – generate profits on you1. And the programmers of these things are not thinking about ethicality – they utilize all possible ways. Grabbing your personal data, getting the payments for the advertisements you watch for them, exploiting your hardware to mine cryptocurrencies – that is not the full list of what they do. Do you want to be a riding steed? That is a rhetorical question.

What does the pop-up with Trojan:Win32/Raccoon.RH!MTB detection mean?

The Trojan:Win32/Raccoon.RH!MTB detection you can see in the lower right side is displayed to you by Microsoft Defender. That anti-malware application is good at scanning, however, prone to be basically unstable. It is defenseless to malware attacks, it has a glitchy interface and bugged malware clearing capabilities. Hence, the pop-up which says about the Raccoon is simply a notification that Defender has actually detected it. To remove it, you will likely need to use another anti-malware program.

Trojan:Win32/Raccoon.RH!MTB found

Microsoft Defender: “Trojan:Win32/Raccoon.RH!MTB”

Having Trojan:Win32/Raccoon.RH!MTB malware on your computer is not a pleasant thing from any perspective. The most troublesome problem is that you will not discover anything wrong. Key speciality of any spyware is being as secretive as possible. Some Raccoon samples also can perform self-deletion after gathering all the valuable information available on the PC. After that, it will be practically impossible to recover the flow of events and understand how your accounts were hacked. Long-residing variants of spyware can aim at the specific folder in the system or file type. Then, files grabbed in such a way will be put for sale on the Darknet – at one of its numerous forums with leaked data.

Spyware Summary:

NameRaccoon Spyware
DamageSteal personal data contained in the attacked system.
Fix ToolSee If Your System Has Been Affected by Raccoon Spyware

Raccoon Trojan Technical Description

Malware Behaviour
Click to expand
  • Behavioural detection: Executable code extraction – unpacking;
  • Yara rule detections observed from a process memory dump/dropped files/CAPE;
  • CAPE extracted potentially suspicious content;
  • Unconventionial language used in binary resources: Georgian;
  • The binary likely contains encrypted or compressed data.;
  • Authenticode signature is invalid;
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization;
Alternative detection names
Click to expand
Elasticmalicious (high confidence)
K7AntiVirusTrojan ( 00598d041 )
K7GWTrojan ( 00598d041 )
ESET-NOD32a variant of Win32/Kryptik.HQZE
AvastWin32:CrypterX-gen [Trj]
RisingTrojan.Kryptik!8.8 (TFE:5:pxKt3yj5UfB)
SophosML/PE-A + Troj/Krypt-RF
EmsisoftTrojan.Crypt (A)
MAXmalware (ai score=87)
CynetMalicious (score: 100)
AVGWin32:CrypterX-gen [Trj]
CrowdStrikewin/malicious_confidence_100% (W)

Is Trojan:Win32/Raccoon.RH!MTB dangerous?

As I have pointed out earlier, any malware is threatening. And Trojan:Win32/Raccoon.RH!MTB is not even near of being more annoying than dangerous. The most misleading feature of this malware is the fact you cannot observe its activity in any way, other than with the use of anti-malware software scanning. And while you don’t have a clue, fraudsters who implemented their nasty thing to your system are starting to count the money. Darknet offers a lot of opportunities to market spyware logs for a hefty sum – especially when these logs are newly-collected. And you’d better not imagine what will happen to your accounts when other rascals will put their hands on your credentials.

However, situation may have much faster flow. In some situations, crooks are delivering their virus precisely to the user they are attempting to steal from. Spyware is priceless when it comes to collecting credentials, and some examples aim precisely at online banking accounts or crypto wallets. One may say, giving spyware a run is the same as sending all your money to fraudsters.

How did I get this virus?

It is not easy to line the origins of malware on your computer. Nowadays, things are mixed up, and spreading tactics used by adware 5 years ago may be utilized by spyware nowadays. However, if we abstract from the exact distribution method and will think about why it works, the reply will be really basic – low level of cybersecurity knowledge. People press on ads on weird sites, open the pop-ups they receive in their browsers, call the “Microsoft tech support” thinking that the weird banner that states about malware is true. It is necessary to understand what is legitimate – to avoid misconceptions when trying to determine a virus.

Microsoft tech support scam

The example of Microsoft Tech support scam banner

Nowadays, there are two of the most widespread ways of malware distribution – bait emails and also injection into a hacked program. While the first one is not so easy to evade – you must know a lot to recognize a counterfeit – the second one is easy to address: just do not utilize hacked applications. Torrent-trackers and other providers of “totally free” applications (which are, actually, paid, but with a disabled license checking) are really a giveaway point of malware. And Trojan:Win32/Raccoon.RH!MTB is just one of them.

How to remove the Trojan:Win32/Raccoon.RH!MTB from my PC?

Trojan:Win32/Raccoon.RH!MTB malware is extremely difficult to remove by hand. It stores its data in multiple places throughout the disk, and can restore itself from one of the parts. Furthermore, a number of changes in the windows registry, networking configurations and also Group Policies are fairly hard to identify and change to the original. It is better to make use of a special app – exactly, an anti-malware app. GridinSoft Anti-Malware will fit the best for malware removal goals.

Why GridinSoft Anti-Malware? It is very light-weight and has its databases updated just about every hour. Additionally, it does not have such bugs and exposures as Microsoft Defender does. The combination of these aspects makes GridinSoft Anti-Malware perfect for eliminating malware of any type.

Remove the viruses with GridinSoft Anti-Malware

  • Download and install GridinSoft Anti-Malware. After the installation, you will be offered to perform the Standard Scan. Approve this action.
  • Gridinsoft Anti-Malware during the scan process

  • Standard scan checks the logical disk where the system files are stored, together with the files of programs you have already installed. The scan lasts up to 6 minutes.
  • GridinSoft Anti-Malware scan results

  • When the scan is over, you may choose the action for each detected virus. For all files of Raccoon the default option is “Delete”. Press “Apply” to finish the malware removal.
  • GridinSoft Anti-Malware - After Cleaning
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)


  1. Read about malware types on GridinSoft Threat encyclopedia.

About the author

Robert Bailey

I'm Robert Bailey, a passionate Security Engineer with a deep fascination for all things related to malware, reverse engineering, and white hat ethical hacking.

As a white hat hacker, I firmly believe in the power of ethical hacking to bolster security measures. By identifying vulnerabilities and providing solutions, I contribute to the proactive defense of digital infrastructures.

Leave a Reply