Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Nov 30, 2021 | Updated Feb 13, 2024

Trojan:Win32/Zloader!mclg

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Microsoft Defender Antivirus detects and removes this threat.

This threat is a banking trojan that is designed to steal finance-related credentials, deliver other malware, and facilitate human-operated attacks. ZLoader is a malware family notable for its ability to evolve and change from campaign to campaign. Like many other banking trojans, ZLoader was derived from the ZeuS banking trojan, which was first discovered by researchers in July 2007.

Historically, threat actors have used malicious emails or fake ad campaigns via search engines to deliver ZLoader.

For more information and guidance from Microsoft, read the following blog:

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts. 

To help reduce the impact of this threat, you can:

  1. Immediately isolate the affected device. If ZLoader has been launched, it is likely that the device is under complete attacker control.
  2. Identify the accounts that have been used on the affected device and consider these accounts compromised. Reset passwords or decommission the accounts.
  3. Investigate the device timeline for indications of lateral movement activities using one of the compromised accounts. Check for additional tools, such as Cobalt Strike, that attackers might have dropped to enable credential access, lateral movement, and other attack activities.
  4. Contact your incident response team to start the incident response process. If you don't have one, contact Microsoft support for potential forensic analysis and remediation.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help. 

Devices infected by this trojan might be severely compromised and require complete restoration. Consider restoring your device. When restoring data, ensure that it is a clean, uninfected copy. 

Follow us