Aliases: No associated aliases
Windows Defender Antivirus detects and removes this threat.
This trojan attempts to steal personal information, including banking credentials. It is usually distributed through Office documents or PDFs attached on spam email.
Social engineering on the emails and attachments used to distribute this trojan are designed to entice recipients into clicking links or enabling macros, resulting in the download and installation of the trojan executable containing the credential theft payload.
This trojan has also been observed downloading and installing other malware.
To avoid this threat, always check whether an email is spoofed or fake before opening attachments or clicking links. Spoofed emails can be spotted through typos and suspicious sender addresses.
Learn how artificial intelligence in Windows Defender AV protects you from this threat before it even reaches your computer: How artificial intelligence stopped an Emotet outbreak
For information on defending enterprise environments from this threat, read: Mitigating and eliminating info-stealing Qakbot and Emotet in corporate networks
Use the following free Microsoft software to detect and remove this threat:
You should also run a full scan. A full scan might find hidden malware.
Use cloud protection
Use cloud protection to help guard against the latest malware threats. It’s turned on by default for Microsoft Security Essentials and Windows Defender Antivirus for Windows 10.
Go to Settings > Update & security > Windows Defender > Windows Defender Security Center > Virus & threat protection and make sure that your Cloud-based Protection settings is turned On.
Get more help
If you’re using Windows XP, see our Windows XP end of support page.