Spy Trojan

Trojan:Win32/SpyNoon.RA!MTB removal tips

Malware Removal

The Trojan:Win32/SpyNoon.RA!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/SpyNoon.RA!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Deletes its original binary from disk
  • Behavioural detection: Injection (inter-process)
  • Created a process from a suspicious location
  • CAPE detected the Formbook malware family
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan:Win32/SpyNoon.RA!MTB?


File Info:

name: E7059D3F2412C59284BB.mlw
path: /opt/CAPEv2/storage/binaries/4abb8e36aa5fded1bf28926b9e2b079367504d66aff162dedb480a1f90b71517
crc32: A4B333A0
md5: e7059d3f2412c59284bb935c8fce20e0
sha1: ac895312fdcbdfcec53175cec1b091fc11259387
sha256: 4abb8e36aa5fded1bf28926b9e2b079367504d66aff162dedb480a1f90b71517
sha512: d3a54e75de26055267b6b4144869cab52c1471692778eaf36c4002eb485e8a9773f9e4a049aa26593d01b865b02849bb02e8dbe20b106667bc27f49000586a63
ssdeep: 6144:rGigV7Vx7PB4ACuRcYDvEtcmPOLBU405kN4ow4H/U/3E:kxVTRFv6POtc+4ow4H/U/0
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1BC54231661CA8FEFED7612B025729938D3BED461066B1F978B601FBD3C271874E2285C
sha3_384: 0d5ce60e976a9f128e03b6d001a92a5758edcf620a8319130388c087e3bd18fa4be4ef29dd2ad7a0ed4dff6ca3b3b046
ep_bytes: 81ec8001000053555633db57895c2418
timestamp: 2008-10-10 21:49:01

Version Info:

0: [No Data]

Trojan:Win32/SpyNoon.RA!MTB also known as:

LionicTrojan.Win32.Generic.4!c
DrWebTrojan.Inject4.21030
MicroWorld-eScanTrojan.GenericKD.47516822
FireEyeTrojan.GenericKD.47516822
McAfeeRDN/Generic.dx
SangforTrojan.Win32.Noon.gen
K7AntiVirusTrojan ( 0058b19f1 )
AlibabaTrojanSpy:Win32/SpyNoon.961c34f1
K7GWTrojan ( 0058b19f1 )
CyrenW32/Injector.AQQ.gen!Eldorado
SymantecPacked.Generic.606
ESET-NOD32a variant of Win32/Injector.EQQQ
APEXMalicious
AvastWin32:InjectorX-gen [Trj]
KasperskyHEUR:Trojan-Dropper.Win32.Nuldrop.gen
BitDefenderTrojan.GenericKD.47516822
Ad-AwareTrojan.GenericKD.47516822
SophosMal/Generic-S
Comodo.UnclassifiedMalware@0
TrendMicroTROJ_FRS.VSNTKU21
McAfee-GW-EditionRDN/Generic.dx
EmsisoftTrojan.GenericKD.47516822 (B)
Paloaltogeneric.ml
GDataWin32.Trojan-Stealer.FormBook.GCTRR8
WebrootW32.Trojan.NSISX.Spy.Gen
AviraTR/Injector.otlhu
KingsoftWin32.Troj.Undef.(kcloud)
GridinsoftRansom.Win32.Sabsik.sa
MicrosoftTrojan:Win32/SpyNoon.RA!MTB
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.C4799563
VBA32Trojan.Sabsik.FL
MAXmalware (ai score=80)
MalwarebytesTrojan.Injector
TrendMicro-HouseCallTROJ_FRS.VSNTKU21
FortinetW32/EQQQ!tr
AVGWin32:InjectorX-gen [Trj]
PandaTrj/CI.A

How to remove Trojan:Win32/SpyNoon.RA!MTB?

Trojan:Win32/SpyNoon.RA!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment