Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Apr 26, 2011 | Updated Mar 08, 2018

TrojanDownloader:Win32/Dofoil.D

Detected by Microsoft Defender Antivirus

Aliases: W32/Trojan3.CMI (Command) Trojan.Agent!AwMD52+pVwM (VirusBuster) Win32/Bredolab.ARL (CA) Trojan.Tenagour.3 (Dr.Web) Trojan.Win32.Oficla (Ikarus)

Summary

TrojanDownloader:Win32/Dofoil.D is a trojan that may arrive as a spammed email attachment. It downloads arbitrary files from a remote server.

On March 6, 2018, behavior monitoring and machine learning technologies in Microsoft Defender Antivirus stopped a Dofoil variant (also known as Smoke Loader) that tried to infect more than 400,000 computers. The massive campaign aimed to install a cryptocurrency miner that uses victim computers' resources for coin mining purposes. Learn how artificial intelligence stopped the attack within minutes:

Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

Secure configuration

To ensure you have the best protection, enable the following:

  • Cloud-delivered protection
  • Automatic sample submission

To access these settings on the Windows Defender Security Center app, use the Windows search box to find and open the Windows Defender Security Center. Navigate to Virus & threat protection settings.

Prevent malware infection

To prevent future infection, follow our guide on preventing malware infection.

Follow us