A new Trojan.Dropper has been detected by Microsoft`s security software to infect user systems. Microsoft report that the Trojan may download other malicious files on the infected computes as well as upload files to the cyber-criminal who is controlling it. In addition to that the Trojan may have the ability to modify digital certificates by validating them. Users who believe they have been infected by the threat are strongly advised to immediately take precautions.
|Short Description||The malicious Trojan may gain read and write permissions and connect to a remote host after which download an upload information.|
|Symptoms||The user may witness slow PC, system Freezes, unrecognized processes and unfamiliar mutex.|
|Distribution Method||Via malicious attachments or web links.|
|Detection Tool||Download Malware Removal Tool, to See If Your System Has Been Affected by TrojanDropper:Win32/Sventore.A|
|User Experience||Join our forum to discuss TrojanDropper:Win32/Sventore.A.|
TrojanDropper:Win32/Sventore.A – How Is It Spread
One way this Trojan may infect computer is via malicious e-mail attachments. Cyber-criminals use spam bots to spread fraudulent messages that may resemble a reputable service like Windows Update, Apple Support or others. The messages may contain malicious attachments that could be the payload of the Trojan. The attachment extensions may vary, for example:
→.tmp; .exe; .dll; .bat; .docx; .pdf; where the document files may contain malicious macros.
TrojanDropper:Win32/Sventore.A – How Does It Work
According to a Microsoft security analysis by Jakub Kaminski, once the payload carrying executable has been activated it drops the following modules in new folders starting with “n” in %temp%. The files have been reported to be as follows:
NOTE: These files have the same name as their folder, only the first letter is changed from “n” to “s”.
After installing its modules, each one of which may be preprogrammed to serve different purpose, the malware gets down to business. It is reported to connect via port 80 to the following hosts:
After connecting to the remote host the malware may perform each and every one of these malicious deeds:
- Obtain information about your internet connection and check if you are connected.
- Notify the hacker controlling it that your device has been infected.
- Download other files from its hosts to the victim`s computer and run them as an administrator. These may be other malware such as CryptoWall Ransomware, KoobFace Worm, etc.
- Get system`s configuration information and other info like IP addresses, physical location, etc.
- Upload gathered information to the hacker`s C&C (command and control) center.
- Tamper with any electronic certificates installed on your computer.
- Receive commands pre-set by the attacker.
And here is not where the surprises by TrojanDropper:Win32/Sventore.A end. The threat may also use its connection to the above-mentioned remote hosts or connect to others and send GET type of requests.
Furthermore, the cyber threat has been reported to create several mutex values on infected computers, like:
These may identify uniquely the threat and prevent the same malware being ran twice on the affected computer.
Removing TrojanDropper:Win32/Sventore.A Completely
In order to fully be rid of this Trojan it is strongly advisable to take preventive measures. One way to do it is by following the removal manual after this article. It is also advisable to use an advanced anti-malware tool to scan your computer in safe mode with. You should also back up your data before proceeding with any removals.
Here is how to remove TrojanDropper:Win32/Sventore.A Completely: