Skip to main content
Skip to main content
Microsoft Security Intelligence
49 entries found. Displaying page 1 of 3.
Updated on Jun 04, 2024

Trojan:VBS/XWorm is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

Alert level: severe
Updated on Mar 21, 2024

Trojan:VBS/XWorm!MTB is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on Jun 22, 2025

Trojan:VBS/XWorm!rfn is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence. 

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

Alert level: severe
Updated on Oct 27, 2025
Alert level: severe
Updated on Feb 14, 2024

Trojan:VBS/XwormRAT!MTB is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on Oct 20, 2025

Trojan:VBS/XWorm.P!MTB is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on May 10, 2024

Trojan:VBS/XWorm.GA!MTB is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on May 16, 2024

Trojan:VBS/XWormRAT.RVA is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on May 20, 2025

Trojan:VBS/XWormRAT!rfn is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

Alert level: severe
Updated on Jun 27, 2025

Trojan:VBS/XWorm.AB!MTB is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on Jul 22, 2025

Trojan:VBS/XWorm.SS!MTB is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on Nov 13, 2025
Alert level: severe
Updated on Nov 18, 2025
Alert level: severe
Updated on Nov 20, 2025
Alert level: severe
Updated on Nov 25, 2025
Alert level: severe
Updated on May 20, 2025

Trojan:VBS/XWorm.TRF!MTB is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.  

Alert level: severe
Updated on May 20, 2025

Trojan:VBS/XWorm.LFL!MTB is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on May 20, 2025

Trojan:VBS/XWorm.LFT!MTB is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on May 20, 2025

Trojan:VBS/XWorm.GKN!MTB is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe
Updated on May 20, 2025

Trojan:VBS/XWorm.GKL!MTB is a specific Visual Basic Script (VBS) version of the XWorm remote access trojan (RAT). This trojan family exists within an amorphous threat ecosystem, with variants also identified in Win64 (native 64-bit Windows binary) and MSIL (.NET framework) formats. The VBS iteration differentiates itself by relying entirely on Visual Basic Scripting components to initiate its attack sequence.  

This technique exploits inherent Windows scripting capabilities, often activated through sophisticated social engineering ploys that convince users to manually launch malicious code. The ultimate objective mirrors that of its compiled counterparts: to implant a fully featured RAT that provides unauthorized remote device control, facilitates sensitive data extraction, and establishes a persistent backdoor for broader network incursions. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.    

Alert level: severe