Skip to main content
Skip to main content
243 entries found. Displaying page 3 of 13.
Updated on Apr 08, 2024

Trojan:MSIL/XWorm.GPB!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.       

Alert level: severe
Updated on Apr 23, 2024

Trojan:MSIL/XWorm.AXW!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on May 22, 2024

Trojan:MSIL/XWorm.RDI!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.      

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.SAN!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.   

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.AWX!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.BAA!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.PHU!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.SOR!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.PTL!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.HHD!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.   

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.HHI!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.BAB!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.   

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.AWO!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.      

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.AWM!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.       

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.BSA!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.AOX!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.   

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.SIG!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family. 

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.AWR!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.   

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.SIH!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.   

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.JKT!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe