Skip to main content
Skip to main content
192 entries found. Displaying page 1 of 10.
Updated on Mar 06, 2019

Ransom:Win32/Filecoder describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Jul 17, 2014

Ransom:Win32/FileCoder.A describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Sep 06, 2019

Ransom:Win32/FileCoder.B describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk. 

Alert level: severe
Updated on Sep 06, 2019

Ransom:Win32/FileCoder.C describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Sep 11, 2018

Ransom:Win32/FileCoder!bit describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Oct 24, 2025

Ransom:Win32/FileCoder!dha describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The "!dha" suffix in the detection name indicates that this is a heuristic or behavioral detection. This means that the identification occurs by analyzing suspicious actions and patterns of code that are like known backdoor behaviors as opposed to having a unique, identified fingerprint. Heuristic detection is used for new variants of known malware families or for detecting threats that exhibit polymorphism that modify the code that is visible on the surface, making it hard to detect. 

Alert level: severe
Updated on Jul 06, 2020

Ransom:Win32/Filecoder.KP describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Aug 18, 2020

Ransom:Win32/Filecoder!ml describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk. 

Alert level: severe
Updated on Aug 15, 2022

Ransom:Win32/Filecoder.PC describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Jul 19, 2023

Ransom:Win32/Filecoder.AC describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Sep 15, 2023

Ransom:Win32/Filecoder!pz describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Feb 29, 2024

Ransom:Win32/Filecoder.GF describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk. 

Alert level: severe
Updated on Apr 30, 2024

Ransom:Win32/Filecoder.PF describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Nov 10, 2025

Ransom:Win32/FileCoder!AMTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain at a persistent risk. 

Alert level: severe
Updated on Jun 11, 2019

Ransom:Win32/Filecoder!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Feb 14, 2020

Ransom:Win32/Filecoder!MSR describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk. 

Alert level: severe
Updated on Sep 15, 2020
Alert level: severe
Updated on Apr 15, 2021

Ransom:Win32/Filecoder.STA describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Jun 11, 2022

Ransom:Win32/Filecoder.DLK describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on May 27, 2020

Ransom:Win32/FileCoder.B!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe