Spy Trojan

How to remove “Trojan:Win32/SpyNoon.BK!MTB”?

Malware Removal

The Trojan:Win32/SpyNoon.BK!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/SpyNoon.BK!MTB virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Reads data out of its own binary image
  • A process created a hidden window
  • The binary likely contains encrypted or compressed data.
  • Deletes its original binary from disk
  • Steals private information from local Internet browsers
  • Spoofs its process name and/or associated pathname to appear as a legitimate process
  • Creates a hidden or system file
  • Creates a copy of itself
  • Harvests credentials from local FTP client softwares
  • Harvests information related to installed instant messenger clients
  • Harvests information related to installed mail clients
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
blueriiver-eu.com

How to determine Trojan:Win32/SpyNoon.BK!MTB?


File Info:

crc32: 5660E6F1
md5: b66575e9b08b09e31b3bc4089965474b
name: B66575E9B08B09E31B3BC4089965474B.mlw
sha1: 4223aadc24196da81f227bac55a164007570cdcc
sha256: d83315d4668bd842850d46f216c27b4e38efe9f174ad3737420d556cccd9ed78
sha512: 26995b717bf39e2b937cdb871364cd547a93de2453d5d345ec7cce42b855818be290944740a48b470ed43222755bbbb701dda4a2a1ba93c492a9686655d58a00
ssdeep: 3072:0qGu+vi2BrLozsW+cLZ4+Ds8P/diOoIsAFs3Gnxn4wuZBv3p:rUvi6HOa+FP1iIHnxnuDvp
type: PE32 executable (console) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan:Win32/SpyNoon.BK!MTB also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
FireEyeGeneric.mg.b66575e9b08b09e3
CAT-QuickHealBackdoor.Androm
ALYacGen:Variant.Zusy.361625
MalwarebytesTrojan.MalPack.Generic
AegisLabTrojan.Win32.Zusy.4!c
SangforMalware
K7AntiVirusTrojan ( 005763951 )
BitDefenderGen:Variant.Zusy.361625
K7GWTrojan ( 005763951 )
BitDefenderThetaGen:NN.ZexaF.34780.huZ@aabKFbni
CyrenW32/Kryptik.CXB.gen!Eldorado
SymantecML.Attribute.HighConfidence
APEXMalicious
AvastWin32:PWSX-gen [Trj]
KasperskyHEUR:Backdoor.Win32.Androm.gen
AlibabaBackdoor:Win32/SpyNoon.b9fd0d8b
MicroWorld-eScanGen:Variant.Zusy.361625
TencentWin32.Backdoor.Androm.Pezd
Ad-AwareGen:Variant.Zusy.361625
SophosMal/Generic-S
F-SecureTrojan.TR/ATRAPS.Gen
DrWebTrojan.MulDrop16.9685
TrendMicroBackdoor.Win32.ANDROM.THAAIBA
McAfee-GW-EditionBehavesLike.Win32.Generic.cc
EmsisoftGen:Variant.Zusy.361625 (B)
IkarusTrojan.Inject
GDataGen:Variant.Zusy.361625
JiangminBackdoor.Remcos.clo
AviraTR/ATRAPS.Gen
GridinsoftTrojan.Win32.Kryptik.oa
ArcabitTrojan.Zusy.D58499
ZoneAlarmHEUR:Backdoor.Win32.Androm.gen
MicrosoftTrojan:Win32/SpyNoon.BK!MTB
AhnLab-V3Malware/Gen.RL_Reputation.R363440
McAfeeGenericRXNJ-HI!B66575E9B08B
MAXmalware (ai score=99)
VBA32BScope.Trojan.Wacatac
PandaTrj/CI.A
ESET-NOD32a variant of Win32/Kryptik.HIVP
TrendMicro-HouseCallBackdoor.Win32.ANDROM.THAAIBA
RisingTrojan.Kryptik!1.D165 (CLASSIC)
SentinelOneStatic AI – Malicious PE
FortinetPossibleThreat.MU
AVGWin32:PWSX-gen [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (W)
Qihoo-360Win32/Trojan.PWS.d75

How to remove Trojan:Win32/SpyNoon.BK!MTB?

Trojan:Win32/SpyNoon.BK!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment