Aliases: No associated aliases
This malware file has been crafted to contain code that exploits the Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601). This file might have been forged to spoof legitimate certificates and appear as though it has been signed by a legitimate provider.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
Apply all security updates as soon as possible. Deploy the January 2020 security updates to address this vulnerability.
To get the best and fastest protection from Microsoft Defender Antivirus, ensure it can connect to the cloud protection service. Use the Windows search box to find and open your Virus & threat protection settings and turn on the following: