Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Sep 07, 2022 | Updated Nov 22, 2023

Trojan:Win32/Raccoon.RJ!MTB

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

This is a generic detection for the Raccoon stealer that gets downloaded or dropped to a system through Smoke Loader module. The signature triggers when Smoke Loader or Raccoon PE binaries are found in the system.

Raccoon is an information-stealing malware that is delivered through social engineering techniques like email. It collects sensitive data such as passwords, browser cookies, autofill data, and cryptocurrency wallet details from infected machines, as well as takes screen shots. It’s sold as a malware-as-a-service (MaaS) offering.

For information about Raccoon and other human-operated malware campaigns, read these blog posts: 

Users can take the following steps to mitigate the threat:

  • Isolate the infected system from the network.
  • Look for compromised accounts in the network.
  • Change credentials for compromised accounts.
  • Clear the applicable run entries, scheduled tasks, and files with uncommon name found in %temp% or %appdata% locations.

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

Devices infected by this trojan might be severely compromised and require complete restoration. Consider restoring your device. When restoring data, ensure that it is a clean, uninfected copy.

Follow us