Trojan

Trojan:Win32/StopCrypt.RPS!MTB removal tips

Malware Removal

The Trojan:Win32/StopCrypt.RPS!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/StopCrypt.RPS!MTB virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Kannada
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Detects Sandboxie through the presence of a library
  • Detects Avast Antivirus through the presence of a library
  • Behavioural detection: Injection (inter-process)
  • Created a process from a suspicious location
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization

How to determine Trojan:Win32/StopCrypt.RPS!MTB?


File Info:

name: 5CEB3CAAAA73371DF478.mlw
path: /opt/CAPEv2/storage/binaries/1e1ebae6c65a2517a4ab2b9e0ff4e4cd72fe47348399d46230ba7b1b2e5f174a
crc32: F1BB1331
md5: 5ceb3caaaa73371df478eb21d2fb57af
sha1: 2edcdfc7ad3933a1cc251023a15021928a94f008
sha256: 1e1ebae6c65a2517a4ab2b9e0ff4e4cd72fe47348399d46230ba7b1b2e5f174a
sha512: 90fec8908da7f446a38af84b992d33202b90b376230e6d8df4c56e531f14686d1299d50b187ec0bd561e630ccb4777499ec7ddda729b55fe76a5dea4c5a3e891
ssdeep: 3072:utrQ0m7XkW5yHtwvKLecbtbmq5VKn1HXVKjLq7uxE80P2oid+pySl76rAp:+rQ0moWwHWvQtrVE1HoLKu68vkU+76r
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1A304BE2073E1C031E1A36A3C08B5C3A26E7BB8226775948B675406EE5EF53D0AB753D7
sha3_384: 06d947ddf0f7d6d5ccf2e719c1dd7b2a98448131ca8520ee9196c787404270bf0f5ec5de8e43420696d6a56a17ff2145
ep_bytes: e8aa540000e989feffffcccccccccce8
timestamp: 2021-09-05 08:13:44

Version Info:

FileVersions: 48.90.12.34
Copyrighz: Copyright (C) 2022, pozkarte
ProjectVersion: 84.64.75.52

Trojan:Win32/StopCrypt.RPS!MTB also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
CylanceUnsafe
SangforTrojan.Win32.Save.a
Cybereasonmalicious.7ad393
CyrenW32/Kryptik.GTJ.gen!Eldorado
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
KasperskyUDS:Trojan.Win32.Agent.gen
AvastPWSX-gen [Trj]
TencentTrojan-ransom.Win32.Stop.16000284
McAfee-GW-EditionBehavesLike.Win32.Lockbit.cc
SentinelOneStatic AI – Malicious PE
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.5ceb3caaaa73371d
SophosML/PE-A + Mal/Agent-AWV
IkarusTrojan.Crypter
MicrosoftTrojan:Win32/StopCrypt.RPS!MTB
CynetMalicious (score: 100)
Acronissuspicious
McAfeeArtemis!5CEB3CAAAA73
MalwarebytesTrojan.MalPack.GS
APEXMalicious
RisingMalware.Obscure/Heur!1.A89F (CLASSIC)
MaxSecureTrojan.Malware.300983.susgen
AVGPWSX-gen [Trj]
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan:Win32/StopCrypt.RPS!MTB?

Trojan:Win32/StopCrypt.RPS!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment