We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Trojan:MSIL/Metasploit.DA!MTB
Aliases: No associated aliases
Summary
Trojan:MSIL/Metasploit.DA!MTB is a weaponized remote access trojan (RAT) created in Microsoft Intermediate Language (MSIL) and capable of running within the .NET Common Language Runtime (CLR) on Windows platforms, thereby, establishing a wide compatibility across architectures. It is based on the Meterpreter payload but has been weaponized. It triggers reverse connections to servers controlled by thread actors. This trojan will also launch system commands, maintain persistence, and exfiltrate data, all while opting to run in memory to avoid detection.
This variant is an information thief, in addition to monitoring user activity, or perpetuating other malware, such as ransomware, resulting in the possibility of information breaches or operational impact. The typical method of infection starts from exploiting .NET software, social engineering emails, or from unverified file downloads. While components of Metasploit can have legitimate use, detections should lead to a full investigation as a risk associated with unauthorized access.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the "Metasploit" family.
- Disconnect the compromised device from all networks (both wired and Wi-Fi) as soon as possible. This severs the threat actor’s remote connection and prevents further data exfiltration.
- Use system utilities like Task Manager or Process Explorer to inspect startup entries, scheduled tasks, and running processes for any malicious components that may have established persistence.
- Renew authentication details for local profiles, privileged access, and linked online resources, considering possible credential interception.
- Examine financial, messaging, and essential platforms for atypical transactions indicative of unauthorized entry.
- If the extent of penetration remains ambiguous, revert to a validated, pre-scanned recovery point to evade recurrence.
- For direct intervention on Windows, initiate in protected state, uncover hidden elements, and systematically purge questionable .NET artifacts, registry modifications, or loaded modules, concluding with a restart and confirmatory examination.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.