Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Jun 04, 2024 | Updated Oct 23, 2025

Trojan:VBS/XWorm

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Trojan:VBS/XWorm is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

  • Unplug the ethernet cable or deactivate Wi-Fi to prevent the malware from communicating with its C2 servers and exfiltrating your data. 
  • Identify and eliminate the malicious scheduled tasks using the Task Scheduler application. 
  • Navigate to the file locations identified during the investigation (for example, C:\xmetavip\) and permanently delete all associated files, scripts, and directories. 
  • Verify that UAC is reactivated and inspect Microsoft Defender settings to remove any illicit exclusions the Xworm trojan have inserted for file types or locations. 

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts. 

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help. 

Follow us