Skip to main content
Skip to main content
192 entries found. Displaying page 3 of 10.
Updated on Jul 20, 2023

Ransom:Win32/FileCoder.ZB!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Aug 31, 2023

Ransom:Win32/FileCoder.AN!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Nov 06, 2023

Ransom:Win32/FileCoder.AZ!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Feb 14, 2024

Ransom:Win32/FileCoder.ZA!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Apr 01, 2024

Ransom:Win32/FileCoder.MV!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on May 20, 2025

Ransom:Win32/FileCoder.SP!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Aug 12, 2025

Ransom:Win32/FileCoder.SQ!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Jun 11, 2019

Ransom:Win32/Filecoder.A!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Dec 14, 2019

Ransom:Win32/Filecoder.A!rfn describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Jun 19, 2020

Ransom:Win32/Filecoder.E!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Jun 19, 2020

Ransom:Win32/Filecoder.H!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Jun 19, 2020

Ransom:Win32/Filecoder.F!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Jun 19, 2020

Ransom:Win32/Filecoder.I!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Jun 22, 2020

Ransom:Win32/Filecoder.G!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Feb 02, 2021

Ransom:Win32/Filecoder.A!MSR describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Mar 06, 2021

Ransom:Win32/Filecoder.P!MSR describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk. 

Alert level: severe
Updated on Sep 06, 2020

Ransom:Win32/FileCoder.SBR!MSR describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on May 17, 2021

Ransom:Win32/FileCoder.MAK!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Dec 28, 2021

Ransom:Win32/FileCoder.MBK!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Apr 20, 2022

Ransom:Win32/FileCoder.JSG!MSR describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe