Trojan.Dropper.UAJ
Posted: February 23, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 2/10 |
---|---|
Infected PCs: | 53 |
First Seen: | February 23, 2012 |
---|---|
OS(es) Affected: | Windows |
Trojan.Dropper.UAJ is a Trojan that uses unusually covert methods to launch itself and install a backdoor Trojan that compromises your computer's security functions. The presence of either Trojan.Dropper.UAJ or its payload, Backdoor.Zxshell.B, should be considered a massive peril to your computer's safety and the privacy of your files, but many types of anti-malware products may fail to detect Trojan.Dropper.UAJ due to its non-standard startup process. SpywareRemove.com malware experts recommend that you update all anti-malware products to maximize the possibility of finding Trojan.Dropper.UAJ before damage can be done to your PC. Since Trojan.Dropper.UAJ was first noted as a significant threat in late February of 2012, your security programs should, ideally, all utilize threat definition updates that are dated for or later than that point.
Trojan.Dropper.UAJ – a Typical Dropper with a Rarity of a Stealth Technique
The majority of Trojan.Dropper.UAJ's behavior, included its payload, can be considered typical for Trojan droppers of its type. Trojan.Dropper.UAJ is designed to install a backdoor Trojan that enables further attacks – such as remote access of your PC by criminals, or further installation of specific types of PC threats like spyware. However, where Trojan.Dropper.UAJ differentiates itself lies in how Trojan.Dropper.UAJ starts itself up on your computer in the first place. Whereas a significant majority of Trojans will add their startup entries into the Windows Registry, Trojan.Dropper.UAJ copies and patches a Windows-critical .dll file, comres.dll, to launch from it when the .dll file is required to perform its usual duties. Even if you suspect that your comres.dll is infected by Trojan.Dropper.UAJ, you should avoid deleting Trojan.Dropper.UAJ, since comres.dll is crucial to the proper running of Windows.
Compared to Registry-based startup methods, this behavior leaves fewer virtual footprints for anti-malware applications to use to detect Trojan.Dropper.UAJ, and for this reason SpywareRemove.com malware researchers strongly encourage you to keep all of your security-related software up-to-date for maximum identification of Trojan.Dropper.UAJ. It also allows Trojan.Dropper.UAJ to infect most versions of Windows, from 2K up to Windows 7, and insures compatibility with 32-bit and 64-bit versions of the OS.
Handing Trojan.Dropper.UAJ's Malicious Gift Back to It
Once launched by the relevant .dll file, Trojan.Dropper.UAJ's only payload is to install Backdoor.Zxshell.B. As a backdoor Trojan, Backdoor.Zxshell.B will proceed to attack your computer's security, and may be complicit in:
- Disabling or circumventing the security features of your firewall, router and other network watchdog utilities.
- Allowing criminals to have access to your PC, potentially up to including total control over your computer's actions or the ability to access all files on your hard drive.
- Browser redirect attacks and other issues that can often be created by modifications to your system settings.
- The presence of other PC threats that Backdoor.Zxshell.B is instructed to install without your permission.
Obviously, these issues make any usage of your PC a hazardous one until you've removed Trojan.Dropper.UAJ and Backdoor.Zxshell.B. However, as long as you have anti-malware software that can detect Trojan.Dropper.UAJ to begin with, you should be able to disinfect comres.dll and remove all related PC threats without damaging Windows.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.