We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
TrojanDownloader:O97M/Emotet.ARJ!MTB
Aliases: No associated aliases
Summary
This malware is a weaponized Microsoft Word document designed to download and drop Emotet trojan. The trojan, in turn, steals banking credentials and system information. This malware is typically delivered as an email attachment. Trending topics are used in the subject line to lure recipients into opening the email.
When opened, this weaponized document prompts you to enable macros. Once enabled, the macro code downloads and installs Emotet as a payload to the system. Emotet then accesses your:
- Browser history
- Cookies
- Keyboard inputs
- System information
Emotet campaign operators have also used Emotet to deliver additional malware.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.
Secure configuration
To get the best and fastest protection from Microsoft Defender Antivirus, ensure it can connect to the cloud protection service. Use the Windows search box to find and open your Virus & threat protection settings and turn on the following:
- Cloud-delivered protection
- Automatic sample submission