Skip to main content
Skip to main content
243 entries found. Displaying page 2 of 13.
Updated on Jul 10, 2025

Trojan:MSIL/XWorm.AC!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family. 

Alert level: severe
Updated on Jul 10, 2025

Trojan:MSIL/XWorm.AB!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family. 

Alert level: severe
Updated on Jul 10, 2025

Trojan:MSIL/XWorm.AE!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.  

Alert level: severe
Updated on Jul 10, 2025

Trojan:MSIL/XWorm.AD!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.   

Alert level: severe
Updated on Jul 25, 2025

Trojan:MSIL/XWorm.DG!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on Oct 08, 2025

Trojan:MSIL/XWorm.AH!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family. 

Alert level: severe
Updated on Oct 30, 2025
Alert level: severe
Updated on Nov 05, 2025
Alert level: severe
Updated on Nov 24, 2025
Alert level: severe
Updated on Feb 12, 2026
Alert level: severe
Updated on Feb 25, 2026
Alert level: severe
Updated on Dec 30, 2022

Trojan:MSIL/XWorm.GCD!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on Mar 24, 2023

Trojan:MSIL/XWorm.CXR!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.   

Alert level: severe
Updated on Jul 24, 2023

Trojan:MSIL/XWorm.RDC!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.      

Alert level: severe
Updated on Jul 27, 2023

Trojan:MSIL/XWorm.RDD!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.  

Alert level: severe
Updated on Jul 28, 2023

Trojan:MSIL/XWorm.RDE!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on Aug 16, 2023

Trojan:MSIL/XWorm.NWM!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family. 

Alert level: severe
Updated on Feb 14, 2024

Trojan:MSIL/XWorm.KAC!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.       

Alert level: severe
Updated on Mar 12, 2024

Trojan:MSIL/XWorm.RDF!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on Mar 29, 2024

Trojan:MSIL/XWorm.RDG!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe