We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Trojan:Win64/ShellcodeRunner.KK!MTB
Aliases: No associated aliases
Summary
Trojan:Win64/ShellcodeRunner.KK!MTB is a behavioral detection name; it does not describe a single malicious file but a category of loaders that launch secondary payloads through shellcode injection and reflective loading. These loaders operate almost entirely in system RAM. They rarely write binaries on the disk. Their goal is to deliver info-stealers, backdoors, or ransomware while avoiding traditional file scanners. Threat actors deploy these loaders in targeted campaigns against government agencies, energy firms, and financial institutions. Infection chains usually start with phishing emails that contain ISO images or malicious shortcut files. When a user mounts the ISO or clicks the shortcut, a hidden loader runs. That loader decrypts an embedded payload, allocates executable memory, and jumps to the decrypted code. Recent variants use advanced evasion tactics. These include Bring Your Own Vulnerable Driver (BYOVD) attacks that deactivate endpoint security tools from kernel mode, and compilers like Go that produce single static binaries with no visible import tables.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the ShellcodeRunner family.
- Isolate the device from all networks immediately. Disconnect Ethernet cables, deactivate Wi-Fi adapters through the Windows network settings, and turn off Bluetooth. This stops active data exfiltration and prevents the malware from receiving remote threat actor commands.
- Open Task Manager and end suspicious processes. Look for processes with no valid digital signature. Look for processes running from temporary directories. Look for instances of pyinstaller.exe and ktool.exe. End Task any powershell.exe or cmd.exe processes exhibiting unusual command-line flags.
- Manually clear the %TEMP% directory. Type %temp% in the Run dialog. Select all files. Delete them. This removes many staged loader components and vulnerable drivers.
- Reactivate all deactivated security features. Confirm that Tamper Protection is turned on in Windows Security settings. Confirm that Core Isolation is turned on.
- Open an elevated Command Prompt. Run sfc /scannow to repair system files. Follow this with DISM /Online /Cleanup-Image /RestoreHealth to fix component store corruption.
- Assume all credentials are compromised. Immediately change passwords for any account accessed from the infected device. This includes corporate logins, email, and financial services. Use a known-clean device for these changes.
- Restore encrypted or corrupted data from a known-good offline backup. Do not rely on cloud-synchronized backups until the local environment is confirmed as clean. These backups can also contain the malware or re-introduce it.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.