We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Trojan:VBS/NetSupportRat!MTB
Aliases: No associated aliases
Summary
Trojan:VBS/NetSupportRat!MTB is a malicious scripts written in VBScript that deploy variants of the NetSupport Manager remote access tool weaponized as a remote access trojan (RAT). Unlike binary-based variant Trojan:Win32/NetSupportRat!MTB, this threat uses VBScript as the initial infection vector, often distributed through phishing emails containing malicious attachments or drive-by downloads. Once launched, the script downloads and installs the RAT, allowing unauthorized remote control, data theft, and lateral movement within networks.
The "!MTB" suffix denotes a machine learning-based detection variant. MTB stands for "Machine Learning, Tree-Based," indicating that the detection was generated using a tree-based algorithm like decision trees or random forests trained on large datasets of malware attributes.
- Disconnect from the network to prevent lateral movement or data exfiltration.
- Use Task Manager to end tasks related to wscript.exe, cscript.exe, or client32.exe.
- Delete registry keys under HKCU\Software\Microsoft\Windows\CurrentVersion\Run\
- Remove scheduled tasks created by VBScript.
- Erase all files in %AppData%\Roaming\ subdirectories, including client32.exe, DLLs, and configuration files.
- If critical files were modified, restore from clean backups after eradication.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.