Skip to main content
Skip to main content
9 entries found.
Updated on Jun 20, 2019

HackTool:Win64/JuicyPotato is not a self-propagating malware but rather, is a local privilege escalation tool for 64-bit Windows. The intended function is to cover weaknesses in architecture in Windows using the Component Object Model (COM) is a common way to elevate a threat actors' accesses. If they have already gained a foothold on the device with a standard or service account, JuicyPotato can use escalated privileges to gain the highest "NT AUTHORITY\SYSTEM" level access for total control over the targeted device. Availability of its many variant exploits led to the JuicyPotato being used against a wider array of COM components. While JuicyPotato and its software generally do not contain a payload that destructs, it is the sole ability of taking over a device that causes major antivirus vendors, like Microsoft Defender, to detect and classify it as a malicious hack tool for removal. 

Alert level: high
Updated on Sep 23, 2025

HackTool:Win64/Juicypotato!MTB is not a self-propagating malware but rather, is a local privilege escalation tool for 64-bit Windows. The intended function is to cover weaknesses in architecture in Windows using the Component Object Model (COM) is a common way to elevate a threat actors' accesses. If they have already gained a foothold on the device with a standard or service account, JuicyPotato can use escalated privileges to gain the highest "NT AUTHORITY\SYSTEM" level access for total control over the targeted device. Availability of its many variant exploits led to the JuicyPotato being used against a wider array of COM components. While JuicyPotato and its software generally do not contain a payload that destructs, it is the sole ability of taking over a device that causes major antivirus vendors, like Microsoft Defender, to detect and classify it as a malicious hack tool for removal. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the "JuicyPotato" family.

Alert level: high
Updated on Jul 22, 2021

HackTool:Win64/Juicypotato!mclg is not a self-propagating malware but rather, is a local privilege escalation tool for 64-bit Windows. The intended function is to cover weaknesses in architecture in Windows using the Component Object Model (COM) is a common way to elevate a threat actors' accesses. If they have already gained a foothold on the device with a standard or service account, JuicyPotato can use escalated privileges to gain the highest "NT AUTHORITY\SYSTEM" level access for total control over the targeted device. Availability of its many variant exploits led to the JuicyPotato being used against a wider array of COM components. While JuicyPotato and its software generally do not contain a payload that destructs, it is the sole ability of taking over a device that causes major antivirus vendors, like Microsoft Defender, to detect and classify it as a malicious hack tool for removal. 

Alert level: high
Updated on Apr 30, 2019

HackTool:Win64/JuicyPotato!bit is not a self-propagating malware but rather, is a local privilege escalation tool for 64-bit Windows. The intended function is to cover weaknesses in architecture in Windows using the Component Object Model (COM) is a common way to elevate a threat actors' accesses. If they have already gained a foothold on the device with a standard or service account, JuicyPotato can use escalated privileges to gain the highest "NT AUTHORITY\SYSTEM" level access for total control over the targeted device. Availability of its many variant exploits led to the JuicyPotato being used against a wider array of COM components. While JuicyPotato and its software generally do not contain a payload that destructs, it is the sole ability of taking over a device that causes major antivirus vendors, like Microsoft Defender, to detect and classify it as a malicious hack tool for removal. 

Alert level: high
Updated on Jun 26, 2020

HackTool:Win64/JuicyPotato!rfn is not a self-propagating malware but rather, is a local privilege escalation tool for 64-bit Windows. The intended function is to cover weaknesses in architecture in Windows using the Component Object Model (COM) is a common way to elevate a threat actors' accesses. If they have already gained a foothold on the device with a standard or service account, JuicyPotato can use escalated privileges to gain the highest "NT AUTHORITY\SYSTEM" level access for total control over the targeted device. Availability of its many variant exploits led to the JuicyPotato being used against a wider array of COM components. While JuicyPotato and its software generally do not contain a payload that destructs, it is the sole ability of taking over a device that causes major antivirus vendors, like Microsoft Defender, to detect and classify it as a malicious hack tool for removal. 

Alert level: high
Updated on Jul 30, 2021

HackTool:Win64/JuicyPotato!MSR is not a self-propagating malware but rather, is a local privilege escalation tool for 64-bit Windows. The intended function is to cover weaknesses in architecture in Windows using the Component Object Model (COM) is a common way to elevate a threat actors' accesses. If they have already gained a foothold on the device with a standard or service account, JuicyPotato can use escalated privileges to gain the highest "NT AUTHORITY\SYSTEM" level access for total control over the targeted device. Availability of its many variant exploits led to the JuicyPotato being used against a wider array of COM components. While JuicyPotato and its software generally do not contain a payload that destructs, it is the sole ability of taking over a device that causes major antivirus vendors, like Microsoft Defender, to detect and classify it as a malicious hack tool for removal. 

Alert level: high
Updated on Jan 12, 2023

HackTool:Win64/JuicyPotato.LK!MTB is not a self-propagating malware but rather, is a local privilege escalation tool for 64-bit Windows. The intended function is to cover weaknesses in architecture in Windows using the Component Object Model (COM) is a common way to elevate a threat actors' accesses. If they have already gained a foothold on the device with a standard or service account, JuicyPotato can use escalated privileges to gain the highest "NT AUTHORITY\SYSTEM" level access for total control over the targeted device. Availability of its many variant exploits led to the JuicyPotato being used against a wider array of COM components. While JuicyPotato and its software generally do not contain a payload that destructs, it is the sole ability of taking over a device that causes major antivirus vendors, like Microsoft Defender, to detect and classify it as a malicious hack tool for removal. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the "JuicyPotato" family.

Alert level: high
Updated on May 18, 2020

HackTool:Win64/JuicyPotato.SBR!MSR is not a self-propagating malware but rather, is a local privilege escalation tool for 64-bit Windows. The intended function is to cover weaknesses in architecture in Windows using the Component Object Model (COM) is a common way to elevate a threat actors' accesses. If they have already gained a foothold on the device with a standard or service account, JuicyPotato can use escalated privileges to gain the highest "NT AUTHORITY\SYSTEM" level access for total control over the targeted device. Availability of its many variant exploits led to the JuicyPotato being used against a wider array of COM components. While JuicyPotato and its software generally do not contain a payload that destructs, it is the sole ability of taking over a device that causes major antivirus vendors, like Microsoft Defender, to detect and classify it as a malicious hack tool for removal. 

Alert level: high
Updated on Feb 10, 2021

HackTool:Win64/JuicyPotato.SBR!rfn is not a self-propagating malware but rather, is a local privilege escalation tool for 64-bit Windows. The intended function is to cover weaknesses in architecture in Windows using the Component Object Model (COM) is a common way to elevate a threat actors' accesses. If they have already gained a foothold on the device with a standard or service account, JuicyPotato can use escalated privileges to gain the highest "NT AUTHORITY\SYSTEM" level access for total control over the targeted device. Availability of its many variant exploits led to the JuicyPotato being used against a wider array of COM components. While JuicyPotato and its software generally do not contain a payload that destructs, it is the sole ability of taking over a device that causes major antivirus vendors, like Microsoft Defender, to detect and classify it as a malicious hack tool for removal. 

Alert level: severe