Generic Dropper.p
Posted: November 5, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 9/10 |
---|---|
Infected PCs: | 28 |
First Seen: | November 5, 2012 |
---|---|
Last Seen: | December 3, 2021 |
OS(es) Affected: | Windows |
Generic Dropper.p is a generic label for a Trojan dropper that installs malicious software onto your computer – either without your consent or by misrepresenting its payload as beneficial. Even though Generic Dropper.p can be used in an immense range of attacks, the most recent Generic Dropper.p activities have centered on e-mail spam attacks that appear to be targeted at Middle Eastern law enforcement agencies. After being launched, Generic Dropper.p installs a variant of the Artemis Trojan on the affected PC. SpywareRemove.com malware experts recommend a dual strategy for handling Generic Dropper.p: keeping your e-mail security practices at reasonable levels and using anti-malware programs to remove Generic Dropper.p (along with its payload) if you do happen to get your PC infected.
Don't Let Generic Dropper.p Drop the Boot on Your Hard Drive
Generic Dropper.p is a name that can be applied to many similar variants of Trojan droppers – the vast majority of which have been reported to attack PCs based in the United States. Some of the aliases that Generic Dropper.p can be detected by include W32/Suspicious_Gen4.XXCQ, Trojan-Dropper.Win32.Agent.gnym, TR/Dropper.Gen and Trojan:Win32/Agent.KO. E-mail messages are the most common means of encountering Generic Dropper.p, but instant messenger spam, social networking site spam, malicious sites and compromised websites are other potential infection points.
Despite its tendency to attack US targets, Generic Dropper.p's most recent attack was targeted at Israeli police officials. This attack was disguised as an e-mail message sent by the head of the IDF and included Generic Dropper.p as a file attachment. Because this infection vector is extremely common for many types of Trojans besides Generic Dropper.p, SpywareRemove.com malware experts note that using anti-malware programs to scan suspicious files before opening them is one of the finest plan of action you can use to guard your PC against similar threats.
The Weight of the Stomp in Generic Dropper.p's Payload
Generic Dropper.p installs a variant of the Artemis Trojan, Artemis!2BFE41D7FDB6. SpywareRemove.com malware research team is still analyzing Artemis!2BFE41D7FDB6's payload, but also note that similar attacks against government-based targets tend to include spyware functions that steal confidential data, disrupt communications or damage computer systems. Examples of similar PC threats include the Flame virus, Gauss, Stuxnet, Wiper, Shamoon and Disttrack, all of which also were noted for their involvement in Middle East-based attacks against high-profile targets. The label Artemis!2BFE41D7FDB6 is specific to Generic Dropper.p's variant of Artemis, but other variants of Artemis Trojans also have been seen using other means of distribution.
Because Generic Dropper.p and its Artemis variant have a high chance of including highly-invasive functions, removing Generic Dropper.p and its payload with anti-malware software is recommended ASAP. However, since government and industry-specific malware attacks tend to use sophisticated defenses and may harm your computer if they're removed improperly, manual removal shouldn't be undertaken unless some assistance from PC security professionals is available.
Aliases
More aliases (40)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%APPDATA%\5b150187-0f05-4c72-917c-77c8e6964ac4.exe
File name: 5b150187-0f05-4c72-917c-77c8e6964ac4.exeSize: 110.59 KB (110592 bytes)
MD5: 3ceb3c3bb6c636a1a46a34e3a6e24be3
Detection count: 60
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: April 22, 2013
%APPDATA%\C.exe
File name: C.exeSize: 204.8 KB (204800 bytes)
MD5: 677fec3d9a46d2d4f5f5fa6591118008
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: January 16, 2013
How to add a new button to firefox navigation toolbar?