Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family WinLNK
This threat is a malicious Windows shortcut file (.lnk) designed to act as an initial downloader for other malware. When a user clicks the shortcut, it typically executes a script (e.g., PowerShell) to download and run a more dangerous secondary payload from a remote server. The !MTB suffix indicates it was flagged by a machine learning model based on its behavior.
No detailed analysis available from definition files.
dc8fb465d9b20ffd3e35e6b505ccd3ba82eb752f7ee2840a13ff4975dfaacacaEnsure Windows Defender has quarantined or removed the malicious .lnk file. Run a full system scan with updated antivirus definitions to find any secondary payloads. Investigate the initial access vector (e.g., email, download from a malicious site) and review for signs of further compromise.