We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Trojan:Win32/SparkRat!MTB
Aliases: No associated aliases
Summary
SparkRAT is a Golang-based open-source remote administration tool. This tool is a feature-rich and multiplatform program that works with Windows, Linux, and macOS. SparkRAT is capable of self-updating. When it is installed on a user's system, it can launch commands remotely, control files and processes, download new payloads, and collect information from the infected system, such as by taking screenshots.
This trojan has been involved in multiple campaigns distributing ransomware. Once installed, attackers can use it to perform various tasks, such as downloading other malware onto the target device or network, stealing credential information, or contacting attacker site and giving attackers remote access to your device.
For information about SparkRAT and other human-operated malware campaigns, read these blog posts:
You should keep your antivirus software updated. Use Microsoft Defender for regular system scans and removal of possible threats.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.
Devices infected by this trojan might be severely compromised and require complete restoration. Consider restoring your device. When restoring data, ensure that it is a clean, uninfected copy.