user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:Win64/MetaStealer.PGSL!MTB
Trojan:Win64/MetaStealer.PGSL!MTB - Windows Defender threat signature analysis

Trojan:Win64/MetaStealer.PGSL!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:Win64/MetaStealer.PGSL!MTB
Classification:
Type:Trojan
Platform:Win64
Family:MetaStealer
Detection Type:Concrete
Known malware family with identified signatures
Variant:PGSL
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 64-bit Windows platform, family MetaStealer

Summary:

This is a concrete detection of Trojan:Win64/MetaStealer.PGSL!MTB, an info-stealing trojan targeting 64-bit Windows systems. It is designed to pilfer sensitive data such as credentials, browser history, and cryptocurrency wallet information, with the detection reinforced by machine learning behavioral analysis.

Severity:
Critical
VDM Static Detection:
No detailed analysis available from definition files.
Known malware which is associated with this threat:
Filename: c3c5c914f28e29d9df082774fe16d57f58d97fbab474f5afdac35eaecd3c0b4a
c3c5c914f28e29d9df082774fe16d57f58d97fbab474f5afdac35eaecd3c0b4a
24/01/2026
Filename: xLauncher.exe
bb8a91614a15966f101f95a2657003bac8cf760603c221ed747a76e2fa0db635
23/01/2026
Filename: Installer.exe
765c0ba1d5f663cd1895f15d6035f37f7d9d64ce9f5da476f8bad84cf9692e2c
23/01/2026
Filename: xLauncherFT.exe
a7d5ef5a618ec366bfd27c66e42602b24f512d64e562557b2cd762e1284e25aa
23/01/2026
Filename: Installer.exe
3a05fe684af2ed59bc8aafd1512ea03351feacae4b8c905ae3308aa2d478b1a0
23/01/2026
Remediation Steps:
Immediately isolate the affected system to prevent further compromise or data exfiltration. Perform a full system scan with updated antivirus software to ensure complete removal of the threat. Due to the nature of a stealer trojan, it is highly recommended to change all critical passwords from a trusted device and enable Multi-Factor Authentication (MFA) on all accounts accessed from the compromised machine.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 22/01/2026. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$