Skip to main content
Skip to main content
192 entries found. Displaying page 9 of 10.
Updated on Aug 06, 2025

Ransom:Win32/Filecoder.NHT!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Aug 08, 2025

Ransom:Win32/Filecoder.YBG!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Sep 08, 2025

Ransom:Win32/Filecoder.MAV!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Sep 30, 2025

Ransom:Win32/Filecoder.NPA!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Dec 18, 2025

Ransom:Win32/Filecoder.SXF!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Dec 18, 2025

Ransom:Win32/Filecoder.SXG!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Dec 30, 2025

Ransom:Win32/Filecoder.AHD!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Jan 27, 2026
Alert level: severe
Updated on Dec 05, 2023

Ransom:Win32/Filecoder.PABS!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Dec 08, 2023

Ransom:Win32/Filecoder.PACH!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Dec 15, 2023

Ransom:Win32/Filecoder.PACL!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Dec 15, 2023

Ransom:Win32/Filecoder.PACP!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Feb 14, 2024

Ransom:Win32/Filecoder.PACI!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Feb 14, 2024

Ransom:Win32/Filecoder.PADF!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on May 08, 2024

Ransom:Win32/Filecoder.PADV!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on May 22, 2024

Ransom:Win32/Filecoder.PAEB!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on Jun 05, 2024

Ransom:Win32/Filecoder.PAEG!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on May 20, 2025

Ransom:Win32/Filecoder.PAGQ!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on May 20, 2025

Ransom:Win32/Filecoder.PAGR!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe
Updated on May 20, 2025

Ransom:Win32/Filecoder.PAGS!MTB describes a diverse family of ransomware-as-a-service (RaaS) payloads designed to encrypt data on infected Windows devices and extort payment for decryption. This classification represents a broad malicious ecosystem where various threat actors customize and deploy the malware against organizations in sectors such as healthcare, education, and manufacturing. The threat originates from compromised Remote Desktop Protocol (RDP) connections, phishing campaigns, or secondary payloads dropped by other malware. Because it operates under a service model, the Filecoder constantly evolves, with different versions sharing core code while using varied delivery and persistence techniques to remain a persistent risk.  

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Filecoder family.  

Alert level: severe