Skip to main content
Skip to main content
Published Oct 24, 2014 | Updated Aug 29, 2024

Trojan:Win64/Winnti.A

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Trojan:Win64/Winnti.A is a detection of a Winnti malware component associated with a rootkit used to hide network connection to command and control (C2).

The detection covers both the rootkit itself and the rootkit’s DLL installer.

Users should take the following steps to mitigate the threat:

  • Monitor system behavior and look for signs of compromise. Run a scan to find and remove possible hidden components.
  • Turn on cloud-delivered protection and automatic sample submission on Microsoft Defender Antivirus. These capabilities use artificial intelligence and machine learning to quickly identify and stop new and unknown variants.
  • Pay close attention to any sudden increase in network traffic that might come from a rootkit hiding processes using your connection.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

Follow us