Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Feb 18, 2021 | Updated Aug 23, 2023

Trojan:XML/CobaltStrike

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

This is a detection for the VBA file with XML content (commonly used in Microsoft Office files such as Excel, Word, and PowerPoint). The XML content is responsible for downloading the Cobalt Strike loader from the intended malicious URL.

Cobalt Strike is a commercially available penetration testing tool used for adversary simulation.  It’s also known for being used by threat actors in various campaigns and found in many pre-ransomware incidents.

For information about Cobalt Strike and other human-operated malware campaigns, read these blog posts: 

Users can take the following steps to mitigate the threat:

  • Change credentials for compromised accounts.
  • Look into the compromised accounts for any malware content or activity.
  • Disconnect it from the local area network (LAN) or other networks.

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

Devices infected by this trojan might be severely compromised and require complete restoration. Consider restoring your device. When restoring data, ensure that it is a clean, uninfected copy.

Follow us