Warning message... Link to action
Read about our in-depth analysis of a new high-volume campaign that marked the resurgence of notorious malware-as-a-service Hawkeye Keylogger. Read the blog post
Aliases: Trojan.MSIL.Disfa.bsto (Kaspersky) winpe/Troj_Generic.OEKLP (Norman) Generic34.AXLL (AVG) TR/MSILKrypt.6.258 (Avira) Gen:Variant.MSILKrypt.6 (BitDefender) Win32.HLLW.Autoruner.25074 (Dr.Web) MSIL/Injector.BOX trojan (ESET) MSIL/Injector.PEW!tr (Fortinet) TR/Bladabindi.J.1 (Avira) Trojan.Bladabindi!4BAD (Rising AV) Troj/Bbindi-A (Sophos) Trojan/Win32.Jorik (AhnLab) W32/Bladabindi.D (Norman) Trojan.Bladabindi!4D1D (Rising AV)
Microsoft security software detects and removes this family of threats.
This malware family can steal your sensitive information and send it to a malicious hacker. The family can also download other malware and give backdoor access to your PC.
Variants of the family can spread via infected removable drives, such as USB flash drives. They can also be downloaded by other malware, or spread though malicious links and hacked websites.