user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:Script/Phonzy.B!ml
Trojan:Script/Phonzy.B!ml - Windows Defender threat signature analysis

Trojan:Script/Phonzy.B!ml - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:Script/Phonzy.B!ml
Classification:
Type:Trojan
Platform:Script
Family:Phonzy
Detection Type:Concrete
Known malware family with identified signatures
Variant:B
Specific signature variant within the malware family
Suffix:!ml
Identified through machine learning models
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for Script platform, family Phonzy

Summary:

Trojan:Script/Phonzy.B!ml is a malicious script detected by Microsoft's machine learning models. It belongs to the Phonzy trojan family, which is typically used in phishing campaigns to steal sensitive information like login credentials from the victim's system.

Severity:
Medium
VDM Static Detection:
No specific strings found for this threat
Known malware which is associated with this threat:
Filename: Reservations_15725.7z
edaf90fe3bb8882e2ac5316d4fb4e1bd814b6a0f2a8ec18e957b811af5bbb151
18/11/2025
Filename: frankfile.js
fb630f3025b6688ce6a29101ea311f4c0b65894b64fa82140578e0ac9c34382f
18/11/2025
Filename: morte.ppc
95ef3e464a0cf39246c8e644883b5b44c55de71d23ec924ffb5a020fda61e465
15/11/2025
Filename: PO# 45821 and 45822.js
2ee5d8dd2763926a8cc85b9eef2548ddb233ca9019b87c4d52c2a92736478ae5
15/11/2025
296d6af5b711aada05ec72d517af8b677c32d4f894fda2934ad5289b7f671619
08/11/2025
Remediation Steps:
Ensure Windows Defender has quarantined or removed the threat and run a full system scan with the latest security intelligence updates. Identify the source of the script (e.g., email attachment, web download) and delete it. As a precaution, change passwords for critical accounts that may have been compromised.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 05/11/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$