Skip to main content
Skip to main content
34 entries found. Displaying page 1 of 2.
Updated on May 26, 2023

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.A variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

Alert level: severe
Updated on May 26, 2023

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.E variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

Alert level: severe
Updated on May 26, 2023

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.F variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

Alert level: severe
Updated on Jun 18, 2021

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader!MSR variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

Alert level: severe
Updated on Oct 03, 2023

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader!MTB variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Gootloader family.  

Alert level: severe
Updated on May 20, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader!AMTB variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Gootloader family.  

Alert level: severe
Updated on Dec 18, 2022

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/GootLoader!rfn variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

Alert level: severe
Updated on Apr 07, 2023

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.KA!MTB variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Gootloader family.  

Alert level: severe
Updated on May 20, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.GC!ams variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Gootloader family.  

Alert level: severe
Updated on May 20, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.GD!ams variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

Alert level: severe
Updated on Jul 25, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.DB!ams variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

Alert level: severe
Updated on Jul 25, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.DC!ams variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

Alert level: severe
Updated on Nov 06, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.GE!ams variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

Alert level: severe
Updated on Jul 25, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/GootLoader.A!MTB variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

Alert level: severe
Updated on Jul 25, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.RPF!ams variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

Alert level: severe
Updated on Nov 19, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.HAB!MTB variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Gootloader family.  

Alert level: severe
Updated on Nov 19, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.HAU!MTB variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Gootloader family.  

Alert level: severe
Updated on Nov 19, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.HAF!MTB variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Gootloader family.  

Alert level: severe
Updated on Nov 19, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.HAQ!MTB variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Gootloader family.  

Alert level: severe
Updated on Nov 19, 2025

Gootloader is an initial access malware family that traces its lineage to the Gootkit banking trojan. It now operates as an Initial-Access-as-a-Service (IAaaS) platform for ransomware affiliates. The malware uses a multi-stage JavaScript architecture and only delivers its full payload to Windows devices joined to Active Directory domains. The threat actors compromise WordPress sites that rank highly in search engines, then poison search results for business document templates. The targets who downloaded ZIP archives from fake forum pages and run the JavaScript file inside initiate an infection chain that writes secondary components to the Windows Registry and establishes persistence through Startup folder shortcuts. 

The Trojan:JS/Gootloader.HAV!MTB variant is the most recent iteration of this loader. It uses WOFF2 font glyph substitution on landing pages to defeat static analysis and manual inspection. The loader performs environment checks to confirm Active Directory domain membership, writes second-stage scripts to the AppData directory using .dat or .log extensions before renaming them, and downloads payloads stored as binary blobs in the HKEY_CURRENT_USER registry hive. Some of its campaigns have demonstrated lateral movement from a single infected workstation to domain controller control in 17 hours, and in some cases less than one hour. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Gootloader family.  

Alert level: severe