Home Malware Programs Trojans Trojan.Dropper.UAJ

Trojan.Dropper.UAJ

Posted: February 23, 2012

Threat Metric

Threat Level: 2/10
Infected PCs: 53
First Seen: February 23, 2012
OS(es) Affected: Windows

Trojan.Dropper.UAJ is a Trojan that uses unusually covert methods to launch itself and install a backdoor Trojan that compromises your computer's security functions. The presence of either Trojan.Dropper.UAJ or its payload, Backdoor.Zxshell.B, should be considered a massive peril to your computer's safety and the privacy of your files, but many types of anti-malware products may fail to detect Trojan.Dropper.UAJ due to its non-standard startup process. SpywareRemove.com malware experts recommend that you update all anti-malware products to maximize the possibility of finding Trojan.Dropper.UAJ before damage can be done to your PC. Since Trojan.Dropper.UAJ was first noted as a significant threat in late February of 2012, your security programs should, ideally, all utilize threat definition updates that are dated for or later than that point.

Trojan.Dropper.UAJ – a Typical Dropper with a Rarity of a Stealth Technique

The majority of Trojan.Dropper.UAJ's behavior, included its payload, can be considered typical for Trojan droppers of its type. Trojan.Dropper.UAJ is designed to install a backdoor Trojan that enables further attacks – such as remote access of your PC by criminals, or further installation of specific types of PC threats like spyware. However, where Trojan.Dropper.UAJ differentiates itself lies in how Trojan.Dropper.UAJ starts itself up on your computer in the first place. Whereas a significant majority of Trojans will add their startup entries into the Windows Registry, Trojan.Dropper.UAJ copies and patches a Windows-critical .dll file, comres.dll, to launch from it when the .dll file is required to perform its usual duties. Even if you suspect that your comres.dll is infected by Trojan.Dropper.UAJ, you should avoid deleting Trojan.Dropper.UAJ, since comres.dll is crucial to the proper running of Windows.

Compared to Registry-based startup methods, this behavior leaves fewer virtual footprints for anti-malware applications to use to detect Trojan.Dropper.UAJ, and for this reason SpywareRemove.com malware researchers strongly encourage you to keep all of your security-related software up-to-date for maximum identification of Trojan.Dropper.UAJ. It also allows Trojan.Dropper.UAJ to infect most versions of Windows, from 2K up to Windows 7, and insures compatibility with 32-bit and 64-bit versions of the OS.

Handing Trojan.Dropper.UAJ's Malicious Gift Back to It

Once launched by the relevant .dll file, Trojan.Dropper.UAJ's only payload is to install Backdoor.Zxshell.B. As a backdoor Trojan, Backdoor.Zxshell.B will proceed to attack your computer's security, and may be complicit in:

  • Disabling or circumventing the security features of your firewall, router and other network watchdog utilities.
  • Allowing criminals to have access to your PC, potentially up to including total control over your computer's actions or the ability to access all files on your hard drive.
  • Browser redirect attacks and other issues that can often be created by modifications to your system settings.
  • The presence of other PC threats that Backdoor.Zxshell.B is instructed to install without your permission.

Obviously, these issues make any usage of your PC a hazardous one until you've removed Trojan.Dropper.UAJ and Backdoor.Zxshell.B. However, as long as you have anti-malware software that can detect Trojan.Dropper.UAJ to begin with, you should be able to disinfect comres.dll and remove all related PC threats without damaging Windows.

Loading...