Trojan:MSIL/XWorm.C
Trojan:MSIL/XWorm.C is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
Trojan:MSIL/XWorm.RDF
Trojan:MSIL/XWorm.RDF is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
Trojan:MSIL/XWorm.RDK
Trojan:MSIL/XWorm.RDK is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
Trojan:MSIL/XWorm!rfn
Trojan:MSIL/XWorm!rfn is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
Trojan:MSIL/XWormRAT.A
Trojan:MSIL/XWormRAT.A is a sophisticated and actively developed Remote Access Trojan (RAT) that grants threat actors comprehensive control over infected Windows devices. First identified for sale as a Malware-as-a-Service (MaaS) in mid-2022, its availability in "cracked" versions has led to widespread adoption by threat actors ranging from cybercriminal to advanced persistent threat (APT) groups. Its modular design allows it to function as a Swiss Army knife for threat actor, capable of data theft, surveillance, ransomware deployment, and further network compromise. What makes XWorm particularly challenging for defenders is its operational flexibility and relentless evolution. The malware rarely travels alone; it is delivered alongside other malware families, particularly other RATs, creating layered and persistent threats on compromised devices.
Trojan:MSIL/XWorm.SPXF
Trojan:MSIL/XWorm.SPXF is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
Trojan:MSIL/XWorm.AMAA
Trojan:MSIL/XWorm.AMAA is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
Trojan:MSIL/Xworm!MTB
Trojan:MSIL/Xworm!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.
Trojan:MSIL/XWorm.C!MTB
Trojan:MSIL/XWorm.C!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.
Trojan:MSIL/XWorm.AX!MTB
Trojan:MSIL/XWorm.AX!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.
Trojan:MSIL/XWorm.MC!MTB
Trojan:MSIL/XWorm.MC!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.
Trojan:MSIL/XWorm.NW!MTB
Trojan:MSIL/XWorm.NW!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.
Trojan:MSIL/XWormRAT!MTB
Trojan:MSIL/XWormRAT!MTB is a sophisticated and actively developed Remote Access Trojan (RAT) that grants threat actors comprehensive control over infected Windows devices. First identified for sale as a Malware-as-a-Service (MaaS) in mid-2022, its availability in "cracked" versions has led to widespread adoption by threat actors ranging from cybercriminal to advanced persistent threat (APT) groups. Its modular design allows it to function as a Swiss Army knife for threat actor, capable of data theft, surveillance, ransomware deployment, and further network compromise. What makes XWorm particularly challenging for defenders is its operational flexibility and relentless evolution. The malware rarely travels alone; it is delivered alongside other malware families, particularly other RATs, creating layered and persistent threats on compromised devices.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.
Trojan:MSIL/XWorm.BB!MTB
Trojan:MSIL/XWorm.BB!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.
Trojan:MSIL/XWorm.DB!MTB
Trojan:MSIL/XWorm.DB!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.
Trojan:MSIL/XWorm.DC!MTB
Trojan:MSIL/XWorm.DC!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.
Trojan:MSIL/XWorm.WQ!MTB
Trojan:MSIL/XWorm.WQ!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying solely on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the XWorm family.
Trojan:MSIL/XWorm.AF!MTB
Trojan:MSIL/XWorm.AF!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.
Trojan:MSIL/XWorm.AG!MTB
Trojan:MSIL/XWorm.AG!MTB is an advanced malware family that operates as a Remote Access Trojan (RAT) that carries the “MSIL” designation to signify that the malware is a .NET-based threat that has been compiled to run in Microsoft Intermediate Language. Its .NET-based capabilities allow it to run on any device running Windows that is equipped with the appropriate Common Language Runtime, which means it is a very flexible and persistent backdoor and provides threat actors complete control over the compromised devices.
Xworm is often delivered and sold as Malware-as-a-Service (MaaS), and due to its multifunctionality, it has a multitude of functionalities such as theft of sensitive information, the ability to launch distributed denial-of-service (DDoS) attacks, downloading additional payloads, and keylogging capabilities that allows it to capture sensitive user data, such as passwords and financial information.