Trojan:Win32/Raccrypt.GQ!MTB

Written by Robert Bailey
If you spectate the alert of Trojan:Win32/Raccrypt.GQ!MTB detection, it appears that your computer has a problem. All malicious programs are dangerous, with no deviations. Raccrypt is a malware that aims at exposing your PC to further threats. Most of of the modern virus variants are complex, and can inject various other viruses. Getting the Trojan:Win32/Raccrypt.GQ!MTB virus often means getting a malicious thing which can act like spyware or stealer, downloader, and a backdoor. Seeing this detection means that you must to perform the malware removal as fast as you can.
GridinSoft Anti-Malware Review
It is better to prevent, than repair and repent!
When we talk about the intrusion of unfamiliar programs into your computer’s work, the proverb “Forewarned is forearmed” describes the situation as accurately as possible. Gridinsoft Anti-Malware is exactly the tool that is always useful to have in your armory: fast, efficient, up-to-date. It is appropriate to use it as an emergency help at the slightest suspicion of infection.
Gridinsoft Anti-Malware 6-day trial available.
EULA | Privacy Policy | 10% Off Coupon
Subscribe to our Telegram channel to be the first to know about news and our exclusive materials on information security.

Any malware exists with the only target – gain money on you1. And the programmers of these things are not thinking about ethicality – they utilize all possible methods. Stealing your personal data, receiving the payments for the promotions you watch for them, utilizing your hardware to mine cryptocurrencies – that is not the complete list of what they do. Do you like to be a riding steed? That is a rhetorical question.

What does the pop-up with Trojan:Win32/Raccrypt.GQ!MTB detection mean?

The Trojan:Win32/Raccrypt.GQ!MTB detection you can see in the lower right side is shown to you by Microsoft Defender. That anti-malware application is pretty good at scanning, however, prone to be mainly unstable. It is defenseless to malware invasions, it has a glitchy user interface and problematic malware removal capabilities. For this reason, the pop-up which states about the Raccrypt is rather just a notification that Defender has actually spotted it. To remove it, you will likely need to make use of another anti-malware program.

Trojan:Win32/Raccrypt.GQ!MTB found

Microsoft Defender: “Trojan:Win32/Raccrypt.GQ!MTB”

The exact Trojan:Win32/Raccrypt.GQ!MTB virus is a really nasty thing. It sits inside of your system under the guise of something normal, or as a part of the program you downloaded at a forum. Therefore, it makes all possible steps to weaken your system. At the end of this “party”, it downloads other viruses – ones which are choosen by cybercriminals who manage this malware. Hence, it is impossible to predict the effects from Raccrypt actions. And the unpredictability is one of the most upleasant things when it comes to malware. That’s why it is better not to choose at all, and don’t give it even a single chance to complete its task.

Threat Summary:

NameRaccrypt Trojan
DetectionTrojan:Win32/Raccrypt.GQ!MTB
DetailsRaccrypt tool that looks legitimate but can take control of your computer.
Fix ToolSee If Your System Has Been Affected by Raccrypt Trojan

Technical details for Trojan:Win32/Raccrypt.GQ!MTB

Analysts uncovered the following alterations that Raccrypt Trojan does to the attacked system.

  • Executable code extraction;
  • Attempts to connect to a dead IP:Port (4 unique times);
  • Creates RWX memory;
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic;
  • Performs some HTTP requests;
  • Unconventionial language used in binary resources: Serbian;
  • The binary likely contains encrypted or compressed data.;
  • Collects information to fingerprint the system;
  • Anomalous binary characteristics – likely obfuscation in order to evade the detection by anti-malware programs.

Related domains:
telete.inTrojan-Ransom.StopCrypt
apps.identrust.comTrojan-Ransom.StopCrypt

Detection details

Show the information

File Info:

crc32: 2C5E4BCE
md5: dcd20bb533babcfca02fbf28809f838b
name: DCD20BB533BABCFCA02FBF28809F838B.mlw
sha1: 1f911ea1331de6bbfbac656a454cfb807bd510bf
sha256: f476d4f77c0dc9ec9c2278e0e7a44866f83b2bdb1467e0574ef316fb027fd235
sha512: 803fa8d2eb0a55ec2ac3293cae574280f3c97eaea57a6667cb5e7489a64941f377f559f2499a403dc2fddca8e56a19426b152fbe77a17581bc54a17096f7f60d
ssdeep: 12288:4VEJtDELG2OyT3/foiVTE7gjiQugC9yFsNJwoO:4VAELGiIibjugLoh
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

InternalName: kogzmuahoke.exi
ProductVersion: 91.78.38.10
Copyright: Copyrighz (C) 2020, vodkaguts
Translation: 0x0482 0x011f

Trojan:Win32/Raccrypt.GQ!MTB also known as:

GridinSoftTrojan.Ransom.Gen
BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 00576f791 )
LionicTrojan.Multi.Generic.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Packed2.43354
CynetMalicious (score: 100)
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_90% (W)
K7GWTrojan ( 00576f791 )
CyrenW32/Kryptik.EUY.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HLYC
APEXMalicious
AvastWin32:DropperX-gen [Drp]
KasperskyHEUR:Exploit.Win32.Shellcode.gen
BitDefenderTrojan.GenericKD.37341000
MicroWorld-eScanTrojan.GenericKD.37341000
Ad-AwareTrojan.GenericKD.37341000
SophosMal/Generic-S
McAfee-GW-EditionBehavesLike.Win32.Generic.gc
FireEyeGeneric.mg.dcd20bb533babcfc
EmsisoftTrojan.Agent (A)
SentinelOneStatic AI – Malicious PE
WebrootW32.Trojan.Gen
KingsoftWin32.Troj.Generic_a.a.(kcloud)
MicrosoftTrojan:Win32/Raccrypt.GQ!MTB
GDataTrojan.GenericKD.37341000
AhnLab-V3Trojan/Win.Raccrypt.C4578298
McAfeeArtemis!DCD20BB533BA
MAXmalware (ai score=84)
VBA32BScope.Trojan.Azorult
MalwarebytesTrojan.MalPack.GS
TrendMicro-HouseCallTROJ_FRS.0NA103H421
RisingTrojan.Kryptik!1.D82C (CLASSIC)
IkarusTrojan-Ransom.StopCrypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/GenKryptik.ERHN!tr
AVGWin32:DropperX-gen [Drp]
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.Generic.HwoCueAA

Is Trojan:Win32/Raccrypt.GQ!MTB dangerous?

As I have specified , non-harmful malware does not exist. And Trojan:Win32/Raccrypt.GQ!MTB is not an exclusion. This virus modifies the system configurations, modifies the Group Policies and registry. All of these components are critical for correct system operating, even in case when we are not talking about Windows safety. Therefore, the malware which Raccrypt contains, or which it will inject later, will try to get maximum revenue from you. Cyber burglars can steal your data, and then push it on the Darknet. Using adware and browser hijacker functionality, built in Trojan:Win32/Raccrypt.GQ!MTB malware, they can make revenue by showing you the ads. Each view gives them a penny, but 100 views per day = $1. 1000 victims who watch 100 banners per day – $1000. Easy math, but sad conclusions. It is a bad choice to be a donkey for crooks.

How did I get this virus?

It is difficult to line the sources of malware on your computer. Nowadays, things are mixed up, and distribution methods chosen by adware 5 years ago can be utilized by spyware nowadays. However, if we abstract from the exact distribution method and will think of why it has success, the explanation will be very basic – low level of cybersecurity understanding. Individuals click on ads on odd sites, click the pop-ups they receive in their browsers, call the “Microsoft tech support” thinking that the odd banner that says about malware is true. It is necessary to recognize what is legit – to avoid misunderstandings when trying to figure out a virus.

Microsoft Tech Support Scam

Microsoft Tech Support Scam

Nowadays, there are two of the most common ways of malware distribution – bait emails and also injection into a hacked program. While the first one is not so easy to evade – you need to know a lot to understand a fake – the second one is easy to address: just don’t utilize cracked applications. Torrent-trackers and various other sources of “totally free” applications (which are, in fact, paid, but with a disabled license checking) are just a giveaway point of malware. And Trojan:Win32/Raccrypt.GQ!MTB is simply among them.

How to remove the Trojan:Win32/Raccrypt.GQ!MTB from my PC?

Trojan:Win32/Raccrypt.GQ!MTB malware is extremely hard to erase by hand. It places its documents in numerous places throughout the disk, and can recover itself from one of the parts. Moreover, countless modifications in the windows registry, networking setups and also Group Policies are really hard to find and change to the initial. It is better to make use of a special program – exactly, an anti-malware tool. GridinSoft Anti-Malware will definitely fit the most ideal for virus removal reasons.

Why GridinSoft Anti-Malware? It is really lightweight and has its detection databases updated almost every hour. Furthermore, it does not have such problems and weakness as Microsoft Defender does. The combination of these aspects makes GridinSoft Anti-Malware ideal for clearing away malware of any form.

Remove the viruses with GridinSoft Anti-Malware

  • Download and install GridinSoft Anti-Malware. After the installation, you will be offered to perform the Standard Scan. Approve this action.
  • Gridinsoft Anti-Malware during the scan process

  • Standard scan checks the logical disk where the system files are stored, together with the files of programs you have already installed. The scan lasts up to 6 minutes.
  • GridinSoft Anti-Malware scan results

  • When the scan is over, you may choose the action for each detected virus. For all files of Raccrypt the default option is “Delete”. Press “Apply” to finish the malware removal.
  • GridinSoft Anti-Malware - After Cleaning
Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

References

  1. Read about malware types on GridinSoft Threat encyclopedia.

About the author

Robert Bailey

I'm Robert Bailey, a passionate Security Engineer with a deep fascination for all things related to malware, reverse engineering, and white hat ethical hacking.

As a white hat hacker, I firmly believe in the power of ethical hacking to bolster security measures. By identifying vulnerabilities and providing solutions, I contribute to the proactive defense of digital infrastructures.

Leave a Reply

Sending