Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeThreat LibraryMalware
Boxter

Boxter Malware

Published date: 11/07/25

Written by: Monica Burgess

Glitch effectGlitch effect

Boxter is a trojan that’s been around the block, hitting both Windows and Android systems. It's designed to sneak onto devices, often by tricking users, and then create backdoors, steal information, or download other malicious payloads. Think of it as an uninvited guest who not only overstays their welcome but also unlocks all your doors for their shady friends.


What is Boxter Malware?

Boxter is a classification for a family of trojan malware that primarily targets Windows and Android operating systems. It's not a one-trick pony; different variants have different goals. Some versions, like Trojan.Win32.Boxter, focus on creating backdoors on Windows PCs and stealing system information. Others, such as Trojan.PS1.Boxter, are PowerShell-based scripts used to download and execute other malware. On mobile, the Android.Boxer variant masquerades as a legitimate app to send premium-rate SMS messages without the user's consent, racking up charges for the victim.

Its main purpose is to establish an initial foothold on a system, which can then be used for further malicious activities. Notable aliases include Trojan:PowerShell/Boxter, Trojan.Win32.Boxter.reg, and Trojan:AndroidOS/Boxer.

When was Boxter First Discovered?

The Boxter family has been active for over a decade. The Android variants, like Trojan-AndroidOS.Boxer.a, were first identified around 2012. Windows-based versions have been documented by security researchers for a similar length of time, with new variants and scripts appearing periodically. This longevity shows that its core tactics, while not groundbreaking, remain effective.

Who Created Boxter?

The identities and number of individuals behind Boxter remain unknown. Like many widespread malware families, it's likely the work of multiple threat actors or groups who have modified and redeployed the code over the years. The malware's availability on underground forums contributes to its widespread use by various malicious actors with different motives.

What Does Boxter Target?

Boxter's targeting is broad. The Windows variants affect a wide range of systems, from individual user PCs to corporate workstations. They aren't picky and will infect any vulnerable machine they can access. The PowerShell variants are particularly concerning for businesses, as they can be used in attacks targeting enterprise networks.

The Android versions specifically target mobile users, preying on those who download apps from untrusted, third-party app stores. Geographically, infections have been reported worldwide, making this a global threat.

Boxter Distribution Method

Boxter spreads through several common but effective methods. Let's break them down:

  • Spam and Phishing Emails: A classic for a reason. Users receive emails with malicious attachments disguised as legitimate documents (invoices, shipping notices, etc.) or links to compromised websites.

  • Malicious Bundles: The malware is often bundled with legitimate-looking software, especially freeware or cracked programs downloaded from shady sources. When the user installs the desired program, Boxter installs itself in the background.

  • Third-Party App Stores: For the Android version, the primary vector is unofficial app stores. Threat actors upload a compromised app that contains the Boxer trojan. Unsuspecting users download it, granting it permissions that allow it to send premium SMS messages.

Technical Analysis of Boxter Malware

Once on a system, Boxter gets to work. While the specifics vary by version, the general attack chain is pretty straightforward.

An infection often starts with a user executing a malicious file. For example, a PowerShell-based Boxter variant (Trojan:PowerShell/Boxter.A) runs a script that connects to a command-and-control (C2) server. It then downloads and executes a second-stage payload, which could be anything from spyware to ransomware.

The Trojan.Win32.Boxter.reg variant adds and modifies registry keys to ensure it runs every time the system starts. This allows it to maintain persistence. It also creates a backdoor, allowing a remote attacker to gain access to and control the compromised machine. They can then steal files, install more malware, or use the device as part of a botnet.

The Android version is all about financial fraud. After being installed, it uses the permissions it was granted to secretly send SMS messages to premium-rate numbers owned by the attackers. The victim is often unaware until they receive a surprisingly high phone bill.

Tactics, Techniques & Procedures (TTPs)

Boxter utilizes several MITRE ATT&CK techniques, including:

  • T1566 - Phishing: Using deceptive emails to deliver the initial payload.

  • T1059.001 - Command and Scripting Interpreter: PowerShell: Executing malicious commands and scripts to download further payloads.

  • T1112 - Modify Registry: Altering Windows Registry keys to achieve persistence.

  • T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys: Adding itself to registry run keys to ensure it executes on startup.

  • T1027 - Obfuscated Files or Information: Hiding its malicious code to evade detection by security software.

Indicators of Compromise (IoCs)

Detecting Boxter involves looking for specific artifacts and behaviors. While IoCs change as the malware evolves, here are some common patterns to watch for:

  • Hashes:

    • 18349091873b2a265691456950294154c14771e4 (Trojan.PS1.BOXTER.A)

    • 40F83A387E85501B4B642C06A9331FC6 (Trojan.Win32.BOXTER.REG)

  • Registry Modifications: Creation of new entries in HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run designed to launch the malware at startup.

  • Network Traffic: Unusual outbound connections to unknown IP addresses or domains, especially via PowerShell processes.

  • File System Artifacts: Creation of suspicious .dll or .exe files in temporary folders or user directories.

Malware Guide

Our malware guide shows you how to shut down those infiltration paths before they ever become a crisis.

Read the Malware Guideright arrow

How to Know if You’re Infected with Boxter?

Spotting a Boxter infection can be tricky, as it tries to stay hidden. However, there are some tell-tale signs:

  • Unexpected System Sluggishness: Your computer is suddenly slower than usual, as the malware consumes resources in the background.

  • Strange Network Activity: Your firewall or network monitoring tools flag outbound connections from unexpected applications like PowerShell.

  • Unauthorized Software: You find programs installed on your computer that you don’t remember downloading.

  • High Phone Bills (Android): A sudden, unexplained spike in your mobile phone bill is a major red flag for the Android variant.

  • Security Alerts: Your antivirus or EDR solution alerts you to a trojan detection. Don't ignore these!

Boxter Removal Instructions

If you suspect a Boxter infection, you need to act fast. Trying to remove it manually is risky—you might miss residual files or registry keys, allowing it to pop back up.

The most reliable method is to use a trusted endpoint detection and response (EDR) tool. An EDR solution can identify and quarantine all malicious components, including files, scripts, and persistence mechanisms. For partners using Huntress, our platform can automatically detect threats like Boxter and our 24/7 SOC team can provide assisted remediation to ensure the threat is fully removed.

If you must attempt manual removal, disconnect the infected device from the network immediately to prevent it from spreading or communicating with its C2 server. Then, use a reputable antivirus scanner in safe mode to find and delete the malicious files. However, a full system wipe and restore from a known-good backup is the only way to be 100% certain the threat is gone.

Is Boxter Still Active?

Yes, Boxter is still active in 2025. While some of the original variants are well-documented and easily detected by modern security tools, new versions continue to appear. Attackers are constantly repackaging the malware and using updated scripts to bypass defenses. Its simplicity and adaptability mean it will likely remain a persistent low-level threat for the foreseeable future.

Mitigation & Prevention Strategies

Defending against Boxter boils down to solid cybersecurity fundamentals. You don't need a silver bullet, just a strong shield.

  • Security Awareness Training: Teach users to be suspicious of unsolicited emails, especially those with attachments or urgent calls to action. A well-trained team is your first line of defense.

  • Endpoint Detection and Response (EDR): Deploy an EDR solution to monitor endpoints for suspicious behavior. Tools like the Huntress Managed EDR platform can catch script-based attacks that traditional AV might miss.

  • Patch Management: Keep your operating systems, browsers, and applications updated. Many malware variants exploit known vulnerabilities that have already been patched.

  • Restrict PowerShell: Use application control policies to restrict the use of PowerShell to only authorized users and administrators.

  • Email Filtering: Use an email security gateway to scan and block malicious emails before they ever reach a user’s inbox.

  • 24/7 Monitoring: Threats don't stick to business hours. Having a security operations center (SOC) monitoring your environment around the clock, like the one included with the Huntress platform, ensures that any signs of compromise are investigated and contained immediately.

Boxer Malware FAQS

Boxter is a type of trojan malware that infects Windows and Android devices. It typically tricks users into installing it by disguising itself as a legitimate file or app. Once inside, it can create backdoors for remote access, steal data, or download other malware.

Boxter primarily spreads through phishing emails with malicious attachments, software bundles that include the malware, and fake apps on third-party Android stores. The user is tricked into running the initial installer, which then executes the malicious payload in the background.

Yes, Boxter and its variants remain an active threat. Although many older versions are easily detected by security software, attackers continue to create new versions with updated scripts and evasion techniques, ensuring it remains a persistent problem.

Protection involves a multi-layered approach. This includes security awareness training to spot phishing, deploying a strong endpoint detection and response (EDR) solution, keeping all software patched, and restricting powerful scripting tools like PowerShell.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy