Aliases: No associated aliases
Windows Defender detects and removes this threat.
This threat can give a malicious hacker unauthorized access and control of your PC.
We have seen this backdoor malware encrypt C2 server communications using a combination of Transport Layer Security (TLS) protocol and Rivest Cipher 4 (RC4) key stream cipher. This threat is commonly associated with Trojan:Win32/Autophyte and is used in targeted attacks.
Use the following free Microsoft software to detect and remove this threat:
You should also run a full scan. A full scan might find hidden malware.
Use cloud protection
Use cloud protection to help guard against the latest malware threats. It’s turned on by default for Microsoft Security Essentials and Windows Defender Antivirus for Windows 10.
Go to Settings > Update & security > Windows Defender > Windows Defender Security Center > Virus & threat protection> Virus & threat protection settings, and make sure that your Cloud-based Protection settings is turned On.
Get more help
If you’re using Windows XP, see our Windows XP end of support page.