Skip to main content
Skip to main content
8 entries found.
Updated on Oct 28, 2017

Trojan:Win32/Metasploit.X is a harmful trojan that runs as a 32-bit Windows app backdoor based on the Meterpreter payload of the Metasploit framework, which is an open-source penetration testing tool weaponized by threat actors to use as a remote access trojan (RAT). It makes a reverse connection back to command-and-control server (C2) thereby allowing threat actors to issue commands, keep signals, and exfiltrate data. It operates from memory and, therefore, does not perform disk operations while also maintaining stealth. 

It is a flexible threat for data theft, espionage, or deploying additional payloads like ransomware can result in anything from identity theft to taking down devices. This trojan is often delivered through exploits against applications such as Microsoft Office, or through phishing attacks, which shows the danger of unpatched software and unverified downloads. While a detection is not always indicative of threat actor malice (due to legitimate use of these tools), IT teams are advised to handle the detection as a high-risk event. 

Alert level: severe
Updated on Jun 09, 2020

Trojan:Win32/Metasploit!MTB is a harmful trojan that runs as a 32-bit Windows app backdoor based on the Meterpreter payload of the Metasploit framework, which is an open-source penetration testing tool weaponized by threat actors to use as a remote access trojan (RAT). It makes a reverse connection back to command-and-control server (C2) thereby allowing threat actors to issue commands, keep signals, and exfiltrate data. It operates from memory and, therefore, does not perform disk operations while also maintaining stealth. 

It is a flexible threat for data theft, espionage, or deploying additional payloads like ransomware can result in anything from identity theft to taking down devices. This trojan is often delivered through exploits against applications such as Microsoft Office, or through phishing attacks, which shows the danger of unpatched software and unverified downloads. While a detection is not always indicative of threat actor malice (due to legitimate use of these tools), IT teams are advised to handle the detection as a high-risk event. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the "Metasploit" family.

Alert level: severe
Updated on Aug 03, 2020

Trojan:Win32/Metasploit!MSR is a harmful trojan that runs as a 32-bit Windows app backdoor based on the Meterpreter payload of the Metasploit framework, which is an open-source penetration testing tool weaponized by threat actors to use as a remote access trojan (RAT). It makes a reverse connection back to command-and-control server (C2) thereby allowing threat actors to issue commands, keep signals, and exfiltrate data. It operates from memory and, therefore, does not perform disk operations while also maintaining stealth. 

It is a flexible threat for data theft, espionage, or deploying additional payloads like ransomware can result in anything from identity theft to taking down devices. This trojan is often delivered through exploits against applications such as Microsoft Office, or through phishing attacks, which shows the danger of unpatched software and unverified downloads. While a detection is not always indicative of threat actor malice (due to legitimate use of these tools), IT teams are advised to handle the detection as a high-risk event. 

Alert level: severe
Updated on Sep 18, 2022

Trojan:Win32/Metasploit!rfn is a harmful trojan that runs as a 32-bit Windows app backdoor based on the Meterpreter payload of the Metasploit framework, which is an open-source penetration testing tool weaponized by threat actors to use as a remote access trojan (RAT). It makes a reverse connection back to command-and-control server (C2) thereby allowing threat actors to issue commands, keep signals, and exfiltrate data. It operates from memory and, therefore, does not perform disk operations while also maintaining stealth. 

It is a flexible threat for data theft, espionage, or deploying additional payloads like ransomware can result in anything from identity theft to taking down devices. This trojan is often delivered through exploits against applications such as Microsoft Office, or through phishing attacks, which shows the danger of unpatched software and unverified downloads. While a detection is not always indicative of threat actor malice (due to legitimate use of these tools), IT teams are advised to handle the detection as a high-risk event. 

Alert level: severe
Updated on Jul 25, 2023

Trojan:Win32/Metasploit.CBU!MTB is a harmful trojan that runs as a 32-bit Windows app backdoor based on the Meterpreter payload of the Metasploit framework, which is an open-source penetration testing tool weaponized by threat actors to use as a remote access trojan (RAT). It makes a reverse connection back to command-and-control server (C2) thereby allowing threat actors to issue commands, keep signals, and exfiltrate data. It operates from memory and, therefore, does not perform disk operations while also maintaining stealth. 

It is a flexible threat for data theft, espionage, or deploying additional payloads like ransomware can result in anything from identity theft to taking down devices. This trojan is often delivered through exploits against applications such as Microsoft Office, or through phishing attacks, which shows the danger of unpatched software and unverified downloads. While a detection is not always indicative of threat actor malice (due to legitimate use of these tools), IT teams are advised to handle the detection as a high-risk event. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the "Metasploit" family. 

Alert level: severe
Updated on Aug 29, 2025

Trojan:Win32/Metasploit.TRK!MTB is a harmful trojan that runs as a 32-bit Windows app backdoor based on the Meterpreter payload of the Metasploit framework, which is an open-source penetration testing tool weaponized by threat actors to use as a remote access trojan (RAT). It makes a reverse connection back to command-and-control server (C2) thereby allowing threat actors to issue commands, keep signals, and exfiltrate data. It operates from memory and, therefore, does not perform disk operations while also maintaining stealth. 

It is a flexible threat for data theft, espionage, or deploying additional payloads like ransomware can result in anything from identity theft to taking down devices. This trojan is often delivered through exploits against applications such as Microsoft Office, or through phishing attacks, which shows the danger of unpatched software and unverified downloads. While a detection is not always indicative of threat actor malice (due to legitimate use of these tools), IT teams are advised to handle the detection as a high-risk event. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the "Metasploit" family. 

Alert level: severe
Updated on Dec 19, 2023

Trojan:Win32/Metasploit.AMAA!MTB is a harmful trojan that runs as a 32-bit Windows app backdoor based on the Meterpreter payload of the Metasploit framework, which is an open-source penetration testing tool weaponized by threat actors to use as a remote access trojan (RAT). It makes a reverse connection back to command-and-control server (C2) thereby allowing threat actors to issue commands, keep signals, and exfiltrate data. It operates from memory and, therefore, does not perform disk operations while also maintaining stealth. 

It is a flexible threat for data theft, espionage, or deploying additional payloads like ransomware can result in anything from identity theft to taking down devices. This trojan is often delivered through exploits against applications such as Microsoft Office, or through phishing attacks, which shows the danger of unpatched software and unverified downloads. While a detection is not always indicative of threat actor malice (due to legitimate use of these tools), IT teams are advised to handle the detection as a high-risk event. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the "Metasploit" family. 

Alert level: severe
Updated on Jul 25, 2025

Trojan:Win32/Metasploit.PAFV!MTB is a harmful trojan that runs as a 32-bit Windows app backdoor based on the Meterpreter payload of the Metasploit framework, which is an open-source penetration testing tool weaponized by threat actors to use as a remote access trojan (RAT). It makes a reverse connection back to command-and-control server (C2) thereby allowing threat actors to issue commands, keep signals, and exfiltrate data. It operates from memory and, therefore, does not perform disk operations while also maintaining stealth. 

It is a flexible threat for data theft, espionage, or deploying additional payloads like ransomware can result in anything from identity theft to taking down devices. This trojan is often delivered through exploits against applications such as Microsoft Office, or through phishing attacks, which shows the danger of unpatched software and unverified downloads. While a detection is not always indicative of threat actor malice (due to legitimate use of these tools), IT teams are advised to handle the detection as a high-risk event. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the "Metasploit" family. 

Alert level: severe