New: Threat Exposure Validation Impact Report 2025
Learn More
Join our Summer Webinar Series on Threat Exposure Validation
Register Now
Come meet us at Black Hat USA 2025 | Booth 1640
Book a Meeting

MikuBot Spotted In The Wild

August 21, 2022

The malware is written in C++ and has many capabilities, the developers are actively adding features and offer support for current and future features. Once a machine has been infected the malware will identify competing malware processes and terminate them, it then creates time-based execution processes and startup items. MikuBot also has the ability to create AV exclusions and perform discovery tasks via WMI as well as launch HVNC to allow the threat actor to remotely access and manage the victim machine.