Trojan.Dropper

Short bio

Trojan.Dropper is the generic detection for trojans that drop additional malware on an affected system.

Type and source of infection

Downloaders and droppers are helper programs for various types of malware such as Trojans and rootkits. Usually they are implemented as scripts (VB, batch) or small applications.

They don’t carry any malicious activities by themselves, but just open a way for attack by downloading/decompressing and installing the core malicious modules. To avoid detection, a dropper may also create noise around the malicious module by downloading/decompressing some harmless files.

Downloaders often appear in non-persistent form. They install the malicious module and remove themselves automatically. In such a case, after a single deployment they are no longer a threat. If for some reason they haven’t removed themselves, they can be deleted manually.

More dangerous variants are persistent. They copy themselves to some random, hidden file and create registry keys to run after the system is restarted, attempting to download the malicious modules again. In such cases, to get rid of the downloader it is necessary to find and remove the created keys and the hidden file.

Downloaders and droppers emerged from the idea of malware files that were able to download additional modules (i.e. Agobot, released in 2002).

An interesting example of a modern downloader is OnionDuke (discovered in 2014), carried by infected Tor nodes. It is a wrapper over legitimate software. When a user downloads software via an infected Tor proxy, OnionDuke packs the original file and adds a malicious stub to it. When the downloaded file is run, the stub first downloads malware and installs it on a computer, and then unpacks the legitimate file and removes itself in order to be unnoticed.

Most of the time, the user gets infected by using some unauthenticated online resources. Infections are often consequences of activities like:

  • Clicking malicious links or visiting shady websites
  • Downloading unknown free programs
  • Opening attachments sent with spam
  • Plugging infected drives
  • Using Infected proxy (like in case of OnionDuke)

They may also be installed without user interaction, carried by various exploit kits.

Protection

Malwarebytes protects users from Trojan.Dropper by using real-time protection.

block Trojan.Dropper

Malwarebytes blocks Trojan.Dropper

 

Remediation

Malwarebytes can detect and remove Trojan.Dropper without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language