Skip to main content
Skip to main content
243 entries found. Displaying page 4 of 13.
Updated on May 20, 2025

Trojan:MSIL/XWorm.SLP!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.       

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.SLJ!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.BAD!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.AQW!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.IZK!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.   

Alert level: severe
Updated on May 20, 2025

Trojan:MSIL/XWorm.ZRY!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.   

Alert level: severe
Updated on May 26, 2025

Trojan:MSIL/XWorm.SZP!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.   

Alert level: severe
Updated on Jun 05, 2025

Trojan:MSIL/XWorm.GWL!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.       

Alert level: severe
Updated on Jun 09, 2025

Trojan:MSIL/XWorm.BAE!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.       

Alert level: severe
Updated on Jun 19, 2025

Trojan:MSIL/XWorm.BAF!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on Jun 30, 2025

Trojan:MSIL/XWorm.SPI!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.       

Alert level: severe
Updated on Jul 11, 2025

Trojan:MSIL/XWorm.GVC!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.      

Alert level: severe
Updated on Jul 24, 2025

Trojan:MSIL/XWorm.RDK!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.      

Alert level: severe
Updated on Jul 24, 2025

Trojan:MSIL/XWorm.AYA!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on Jul 24, 2025

Trojan:MSIL/XWorm.RDL!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on Jul 25, 2025

Trojan:MSIL/XWorm.RDM!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.  

Alert level: severe
Updated on Jul 25, 2025

Trojan:MSIL/XWorm.AXO!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.     

Alert level: severe
Updated on Jul 25, 2025

Trojan:MSIL/XWorm.AXM!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.   

Alert level: severe
Updated on Aug 06, 2025

Trojan:MSIL/XWormRAT!atmn is a sophisticated and actively developed Remote Access Trojan (RAT) that grants threat actors comprehensive control over infected Windows devices. First identified for sale as a Malware-as-a-Service (MaaS) in mid-2022, its availability in "cracked" versions has led to widespread adoption by threat actors ranging from cybercriminal to advanced persistent threat (APT) groups. Its modular design allows it to function as a Swiss Army knife for threat actor, capable of data theft, surveillance, ransomware deployment, and further network compromise. What makes XWorm particularly challenging for defenders is its operational flexibility and relentless evolution. The malware rarely travels alone; it is delivered alongside other malware families, particularly other RATs, creating layered and persistent threats on compromised devices.   

Alert level: severe
Updated on Aug 06, 2025

Trojan:MSIL/XWorm.AXC!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.  

Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family. 

Alert level: severe