Skip to main content
Skip to main content
192 entries found. Displaying page 8 of 10.
Updated on Oct 05, 2020

Ransom:Win32/Filecoder.DSC!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Oct 14, 2020

Ransom:Win32/Filecoder.VKY!MSR describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

Alert level: severe
Updated on Feb 10, 2021

Ransom:Win32/Filecoder.PAA!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Nov 11, 2021

Ransom:Win32/Filecoder.OJD!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Jan 05, 2022

Ransom:Win32/Filecoder.DLK!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family. 

Alert level: severe
Updated on Jan 19, 2022

Ransom:Win32/Filecoder.DEC!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Jan 19, 2022

Ransom:Win32/Filecoder.RTR!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Jan 24, 2022

Ransom:Win32/Filecoder.RTS!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Feb 01, 2022

Ransom:Win32/Filecoder.PBM!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Apr 18, 2022

Ransom:Win32/Filecoder.WTY!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Jun 01, 2022

Ransom:Win32/Filecoder.PAC!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Aug 22, 2022

Ransom:Win32/Filecoder.PAE!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Oct 12, 2023

Ransom:Win32/Filecoder.PPI!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Feb 14, 2024

Ransom:Win32/Filecoder.SGA!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Feb 14, 2024

Ransom:Win32/Filecoder.PPN!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Feb 23, 2024

Ransom:Win32/Filecoder.PPV!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Mar 22, 2024

Ransom:Win32/Filecoder.NBA!ibt describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk. 

Alert level: severe
Updated on May 20, 2025

Ransom:Win32/Filecoder.SWA!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on May 20, 2025

Ransom:Win32/Filecoder.NMA!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Jul 25, 2025

Ransom:Win32/Filecoder.SUR!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe