We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Trojan:Win32/WinLNK.AMCD
Aliases: No associated aliases
Summary
Trojan:Win32/WinLNK.AMCD describes a category of malware that weaponizes Windows shortcut files to initiate device compromise. Threat actors use .lnk files as the initial launch vector because Windows treats them as trusted components. The shortcut files point to legitimate Windows binaries, typically PowerShell, and pass obfuscated commands that download and run the final malicious payload. This approach bypasses security tools that focus primarily on scanning binary files. The delivered payloads vary widely and include remote access tools.
The infection chain relies on social engineering to convince users to open the shortcut. Delivery methods include phishing emails with malicious links that abuse OAuth authentication flows, as well as fraudulent advertisements on search engines that direct users to compromised websites hosting the payload. Once the shortcut runs, it initiates a multi-stage process that often uses fileless launch techniques to avoid detection. WinLNK inject code into legitimate processes or use DLL sideloading to run under the guise of signed applications. These characteristics make WinLNK a persistent and adaptable threat that targets both individuals and organizations.
- Immediately isolate the affected device from all network connections. Disconnect Ethernet cables and deactivate Wi-Fi. This action prevents communication with the command-and-control server, stops ongoing data exfiltration, and halts the spread to network shares or other devices.
- Boot the device into Safe Mode to prevent the malware from loading. Perform a full system scan using Microsoft Defender. For a more thorough check, use Microsoft Defender Offline which runs from a bootable environment outside the infected Windows installation.
- Use Microsoft Autoruns to inspect all auto-starting locations. Carefully review every entry and deactivate or delete any unrecognized or suspicious entries associated with known malware file names or registry keys.
- If Windows Security continues to report a threat after file removal, the detection history can be corrupted. Restart in Safe Mode. Navigate to C:\ProgramData\Microsoft\Windows Defender\Scans\History\Service\ and delete the DetectionHistory folder. Restart normally to force history to rebuild correctly.
- If ransomware encrypted files, restore them from a clean backup. Ensure the backup predates the infection and remains stored offline or on an isolated network segment to prevent encryption.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.