Spy

Spyware.RaccoonStealer removal instruction

Malware Removal

The Spyware.RaccoonStealer is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Spyware.RaccoonStealer virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (3 unique times)
  • Creates RWX memory
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Reads data out of its own binary image
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Attempts to create or modify system certificates
  • Collects information to fingerprint the system

Related domains:

z.whorecord.xyz
a.tomx.xyz
doc-0o-cc-docs.googleusercontent.com

How to determine Spyware.RaccoonStealer?


File Info:

crc32: 2E605F19
md5: b002f560e45d971e3d32c2216d03e6c7
name: ok.exe
sha1: efc70803f8b7a7a7ecb96c79b75f0a8920179e1f
sha256: ddf3066358db9d660fc551a401e3211e85abe69a66e5ef88616adeb278d260ce
sha512: 5fd3d0381662a7f2785ad51e6782927c69f55f614c68257984ddd7db3e00d84ae0572b05104e13f3999e33842a2ff41aa3fefc85fe95bbc300384619d1e616a7
ssdeep: 12288:miVJrefbakECNxkj4tXxfugpwlYZnHJWxfVO3wwr5EeQ9KbhBRTaD/COzP9:MfbaNCNS4thlw+wxfVswGWeJwD/zV
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) 2003
InternalName: ScrollablePropPageDialog
FileVersion: 1, 0, 0, 1
CompanyName:
LegalTrademarks:
ProductName: ScrollablePropPageDialog Application
ProductVersion: 1, 0, 0, 1
FileDescription: ScrollablePropPageDialog MFC Application
OriginalFilename: ScrollablePropPageDialog.EXE
Translation: 0x0409 0x04b0

Spyware.RaccoonStealer also known as:

MicroWorld-eScanTrojan.GenericKD.32770709
CAT-QuickHealTrojanpws.Racealer
ALYacTrojan.GenericKD.32770709
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Multi.Generic.4!c
SangforMalware
K7AntiVirusTrojan ( 0055c2e01 )
BitDefenderTrojan.GenericKD.32770709
K7GWTrojan ( 0055c2e01 )
BitDefenderThetaGen:NN.ZexaF.32517.@q3@aaip3mdi
SymantecTrojan Horse
ESET-NOD32a variant of Win32/GenKryptik.DYMJ
TrendMicro-HouseCallTROJ_FRS.0NA103KS19
AvastWin32:TrojanX-gen [Trj]
GDataTrojan.GenericKD.32770709
KasperskyTrojan-PSW.Win32.Racealer.blm
AlibabaTrojanPSW:Win32/Racealer.4521e6ad
ViRobotTrojan.Win32.Z.Genkryptik.1042752
RisingTrojan.Conteban!8.10C02 (TFE:5:fjgnimz6WOK)
Ad-AwareTrojan.GenericKD.32770709
F-SecureTrojan.TR/AD.StellarStealer.cyuud
DrWebTrojan.PWS.Stealer.27504
ZillyaTrojan.Azorult.Win32.17
TrendMicroTROJ_FRS.0NA103KS19
McAfee-GW-EditionGenericRXJE-YB!B002F560E45D
SophosTroj/Steale-CR
APEXMalicious
CyrenW32/Trojan.JRLN-6567
JiangminTrojan.PSW.Racealer.oj
WebrootW32.Trojan.Gen
AviraTR/AD.StellarStealer.cyuud
Endgamemalicious (high confidence)
ArcabitTrojan.Generic.D1F40A95
ZoneAlarmTrojan-PSW.Win32.Racealer.blm
MicrosoftTrojan:Win32/Occamy.C
McAfeeGenericRXJE-YB!B002F560E45D
MAXmalware (ai score=89)
VBA32TrojanPSW.Racealer
MalwarebytesSpyware.RaccoonStealer
PandaTrj/CI.A
IkarusTrojan.Inject
MaxSecureTrojan.Malware.74652977.susgen
FortinetW32/GenKryptik.DYMJ!tr
AVGWin32:TrojanX-gen [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_70% (W)
Qihoo-360Win32/Trojan.PSW.b1a

How to remove Spyware.RaccoonStealer?

Spyware.RaccoonStealer removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment