We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Backdoor:Win32/Turla.PA
Aliases: No associated aliases
Summary
Backdoor:Win32/Turla.PA is the detection for a dropper used in cyber espionage campaigns. Turla leverages PowerShell and VBScript, backdoors, and trojans to infiltrate target devices, communicate with command and control (C2) servers, attain persistence and escalated privileges, and exfiltrate data. The dropper creates encrypted tasks that implant rootkits and service loaders.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.
Devices infected by this trojan might be severely compromised and require complete restoration. Consider restoring your device. When restoring data, ensure to use an uninfected copy.