Published Oct 02, 2017 | Updated Feb 20, 2018


Severe |Detected with Windows Defender Antivirus

Aliases: No associated aliases


Windows Defender Antivirus detects and removes this threat.

This trojan attempts to steal personal information, including banking credentials. It is usually distributed through Office documents or PDFs attached on spam email.

Social engineering on the emails and attachments used to distribute this trojan are designed to entice recipients into clicking links or enabling macros, resulting in the download and installation of the trojan executable containing the credential theft payload.

This trojan has also been observed downloading and installing other malware.

To avoid this threat, always check whether an email is spoofed or fake before opening attachments or clicking links. Spoofed emails can be spotted through typos and suspicious sender addresses.

Learn how artificial intelligence in Windows Defender AV protects you from this threat before it even reaches your computer: How artificial intelligence stopped an Emotet outbreak

For information on defending enterprise environments from this threat, read: Mitigating and eliminating info-stealing Qakbot and Emotet in corporate networks

Use the following free Microsoft software to detect and remove this threat:

You should also run a full scan. A full scan might find hidden malware. 

Use cloud protection 

Use cloud protection to help guard against the latest malware threats. It’s turned on by default for Microsoft Security Essentials and Windows Defender Antivirus for Windows 10. 

Go to Settings > Update & security > Windows Defender > Windows Defender Security Center > Virus & threat protection and make sure that your Cloud-based Protection settings is turned On

Get more help

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

If you’re using Windows XP, see our Windows XP end of support page.

Follow us