user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:JS/GuLoader.SOJ!MTB
Trojan:JS/GuLoader.SOJ!MTB - Windows Defender threat signature analysis

Trojan:JS/GuLoader.SOJ!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:JS/GuLoader.SOJ!MTB
Classification:
Type:Trojan
Platform:JS
Family:GuLoader
Detection Type:Concrete
Known malware family with identified signatures
Variant:SOJ
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for JavaScript platform, family GuLoader

Summary:

This threat is a JavaScript-based Trojan from the GuLoader family. It functions as a sophisticated downloader, designed to bypass security measures and retrieve additional, potentially more harmful, malware onto the compromised system, such as infostealers or ransomware. Its detection is concrete and low risk for false positives, indicating a high confidence in its malicious nature.

Severity:
High
VDM Static Detection:
No detailed analysis available from definition files.
Known malware which is associated with this threat:
Filename: Payment_Confirmation 900120251865 Remittance_Copy_2025-12-19_pdf.js
4f039c90a185cf2b4e09111403b53acc3977877cb0c0da4ff115bf7add684b50
21/12/2025
Filename: EO-PI894092-07738.js
2c7448c547782e1ddf8773c9f213403fda5f0f3a589d68b51e5e06e3ac08ad7d
18/12/2025
Filename: NotaCredito_en_PDF_12162500.js
872faba27401f1dcdf7189c5066f6b506ca76d8b0f69d9b11ad73a39b9c3cf91
18/12/2025
Remediation Steps:
Immediately isolate the affected system, run a full system scan with updated antivirus software, and ensure all detected malicious files are quarantined or deleted. Investigate for any signs of further compromise or persistence mechanisms, and consider re-imaging the system if critical assets are involved.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 18/12/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$