Skip to main content
Skip to main content
Microsoft Security Intelligence
33 entries found. Displaying page 1 of 2.
Updated on Sep 30, 2021

This is a detection for a generic trojan horse that has been identified as a component to carry out a specific task within a malware framework.

For information about Malgent and other human-operated malware campaigns, read these blog posts: 

Alert level: severe
Updated on Jul 24, 2025
Alert level: severe
Updated on May 10, 2019
Alert level: severe
Updated on May 10, 2019
Alert level: severe
Updated on Mar 01, 2023
Alert level: severe
Updated on Jun 09, 2023
Alert level: severe
Updated on Sep 15, 2023
Alert level: severe
Updated on Jul 24, 2025
Alert level: severe
Updated on Jul 04, 2019
Alert level: severe
Updated on Sep 22, 2019

Trojan:Win32/Malgent!MSR is a malware strain used by Diamond Sleet, a North Korean state-sponsored threat actor, in its software hijacking campaigns. The malware is primarily delivered through social engineering attacks using WhatsApp, LinkedIn, OneDrive, and Google Drive, where victims receive *.zip files containing trojanized software. These zip files often use job-related lures, masquerading as legitimate engineering, maintenance technician, or program manager documents. Once the victim runs the software, DLL hijacking occurs, allowing the attacker to install a backdoor, enabling further payload execution and credential theft. 

Alert level: severe
Updated on Oct 24, 2019
Alert level: severe
Updated on Oct 14, 2022
Alert level: severe
Updated on Dec 08, 2022
Alert level: severe
Updated on Mar 04, 2024
Alert level: severe
Updated on Sep 25, 2025
Alert level: severe
Updated on Jul 23, 2021
Alert level: severe
Updated on May 20, 2025
Alert level: severe
Updated on Aug 02, 2019
Alert level: severe
Updated on Dec 14, 2019
Alert level: severe
Updated on Oct 15, 2025
Alert level: severe