Home Malware Programs Trojans TrojanDropper:Win32/Fedripto.A

TrojanDropper:Win32/Fedripto.A

Posted: October 11, 2011

Threat Metric

Threat Level: 9/10
Infected PCs: 57
First Seen: October 11, 2011
OS(es) Affected: Windows

TrojanDropper:Win32/Fedripto.A is a dropper Trojan that can install a wide range of other forms of hostile software, including spyware, other Trojans, viruses and fake security software. The distribution method that TrojanDropper:Win32/Fedripto.A uses is somewhat innovative – TrojanDropper:Win32/Fedripto.A pretends to be a .jpg screenshot of a random gaming application's item that an anonymous player wishes to trade or sell to you. If you're a fan of item-trading in virtual card games or similar game economies, you may be tempted to lower your guard and click this 'screenshot' link, but doing so will only infect your PC with TrojanDropper:Win32/Fedripto.A. SpywareRemove.com malware experts strongly encourage you to scan your PC with a suitable anti-malware program, if you suspect that you've fallen for this item-trading scam, which is capable of causing severe harm to your PC if left untreated for a prolonged period of time.

Why That E-Card Screenshot Might Be a Lurking TrojanDropper:Win32/Fedripto.A

TrojanDropper:Win32/Fedripto.A is often seen in the form of a link that's sent out by instant messaging spammers, although TrojanDropper:Win32/Fedripto.A may also be present in other formats such as spam e-mail messages. Along with the link to TrojanDropper:Win32/Fedripto.A's fake JPEG file, there is typically an included message that tries to make you think that the file is a screenshot for a popular online game item. TrojanDropper:Win32/Fedripto.A's scam may even offer an extremely rare item for an unusually low rate to garner especial interest. This form of scam is capable of targeting World of Warcraft players, Second Life players, Team Fortress 2 players and players of various other types of games that include some form of item-collecting and trading.

SpywareRemove.com malware experts have also noted that, in addition to Troj/VB-FPL's initial .jpg link disguise, TrojanDropper:Win32/Fedripto.A will even imitate the icon of a .jpg file and may even display an actual .jpg picture for a distraction. Despite this thorough concealment, however, it's worth noting that any attempt to access a TrojanDropper:Win32/Fedripto.A file, regardless of Troj/VB-FPL's apparent format, will infect your PC. TrojanDropper:Win32/Fedripto.A Trojans have no known aliases but may be configured to install a wide range of different files, including Backdoor:Win32/Zegost.H, a backdoor Trojan that allows remote criminals to access and control your PC.

Spurning TrojanDropper:Win32/Fedripto.A's Rotten Trading Deal

TrojanDropper:Win32/Fedripto.A infections, although they have few symptoms, can cause considerable damage to your PC if allowed to function freely and without impediments. Common dangers that are associated with TrojanDropper:Win32/Fedripto.A and similar dropper Trojans include (but aren't limited to):

  • The installation of a backdoor Trojan program that attacks your computer's network and firewall security, such as Backdoor:Win32/Zegost.H. Backdoor Trojans make your computer vulnerable to additional attacks and can allow your PC to be co-opted into botnets for DDoS attacks, spamming and other crimes.
  • The installation of scamware programs, such as fake anti-virus scanners, fake Registry cleaners or fake anti-spyware applications. Rogue applications that are security or diagnostic-oriented will tend to create fake system errors as part of their scam to acquire your credit card number.
  • Altered system settings, such as exceptions that have been added to your firewall or network ports that have been opened. In most cases, you will not be able to undo these negative changes, until you remove TrojanDropper:Win32/Fedripto.A.

SpywareRemove.com malware researchers encourage the removal of any TrojanDropper:Win32/Fedripto.A with appropriate anti-malware programs, since TrojanDropper:Win32/Fedripto.A will corrupt the Windows Registry and may install other infections that can be difficult to delete without any software-based aid. Several full system scans in Safe Mode may be required to remove all components of a TrojanDropper:Win32/Fedripto.A infection.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 525.82 KB (525824 bytes)
MD5: 9807c3f8fbc97b0057181f8d147d0fe7
Detection count: 43
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 13, 2011
file.exe File name: file.exe
Size: 811 KB (811008 bytes)
MD5: c8b3331e3ea2fdec386a12945f8104b1
Detection count: 40
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 13, 2011
file.exe File name: file.exe
Size: 569.34 KB (569344 bytes)
MD5: 73e75368afde3b261fad164cbfbbdbfb
Detection count: 39
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 13, 2011
file.exe File name: file.exe
Size: 57.34 KB (57344 bytes)
MD5: 7440734437fa7249c9b7f29b061844e1
Detection count: 38
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 13, 2011
file.exe File name: file.exe
Size: 474.62 KB (474624 bytes)
MD5: 44f06da34fd0b6e7d522566ff4963458
Detection count: 37
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 13, 2011
%temp%\811356.tmp File name: %temp%\811356.tmp
File type: Temporary File
Mime Type: unknown/tmp
Group: Malware file
Loading...