TrojanDropper:Win32/Fedripto.A
Posted: October 11, 2011
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 9/10 |
---|---|
Infected PCs: | 57 |
First Seen: | October 11, 2011 |
---|---|
OS(es) Affected: | Windows |
TrojanDropper:Win32/Fedripto.A is a dropper Trojan that can install a wide range of other forms of hostile software, including spyware, other Trojans, viruses and fake security software. The distribution method that TrojanDropper:Win32/Fedripto.A uses is somewhat innovative – TrojanDropper:Win32/Fedripto.A pretends to be a .jpg screenshot of a random gaming application's item that an anonymous player wishes to trade or sell to you. If you're a fan of item-trading in virtual card games or similar game economies, you may be tempted to lower your guard and click this 'screenshot' link, but doing so will only infect your PC with TrojanDropper:Win32/Fedripto.A. SpywareRemove.com malware experts strongly encourage you to scan your PC with a suitable anti-malware program, if you suspect that you've fallen for this item-trading scam, which is capable of causing severe harm to your PC if left untreated for a prolonged period of time.
Why That E-Card Screenshot Might Be a Lurking TrojanDropper:Win32/Fedripto.A
TrojanDropper:Win32/Fedripto.A is often seen in the form of a link that's sent out by instant messaging spammers, although TrojanDropper:Win32/Fedripto.A may also be present in other formats such as spam e-mail messages. Along with the link to TrojanDropper:Win32/Fedripto.A's fake JPEG file, there is typically an included message that tries to make you think that the file is a screenshot for a popular online game item. TrojanDropper:Win32/Fedripto.A's scam may even offer an extremely rare item for an unusually low rate to garner especial interest. This form of scam is capable of targeting World of Warcraft players, Second Life players, Team Fortress 2 players and players of various other types of games that include some form of item-collecting and trading.
SpywareRemove.com malware experts have also noted that, in addition to Troj/VB-FPL's initial .jpg link disguise, TrojanDropper:Win32/Fedripto.A will even imitate the icon of a .jpg file and may even display an actual .jpg picture for a distraction. Despite this thorough concealment, however, it's worth noting that any attempt to access a TrojanDropper:Win32/Fedripto.A file, regardless of Troj/VB-FPL's apparent format, will infect your PC. TrojanDropper:Win32/Fedripto.A Trojans have no known aliases but may be configured to install a wide range of different files, including Backdoor:Win32/Zegost.H, a backdoor Trojan that allows remote criminals to access and control your PC.
Spurning TrojanDropper:Win32/Fedripto.A's Rotten Trading Deal
TrojanDropper:Win32/Fedripto.A infections, although they have few symptoms, can cause considerable damage to your PC if allowed to function freely and without impediments. Common dangers that are associated with TrojanDropper:Win32/Fedripto.A and similar dropper Trojans include (but aren't limited to):
- The installation of a backdoor Trojan program that attacks your computer's network and firewall security, such as Backdoor:Win32/Zegost.H. Backdoor Trojans make your computer vulnerable to additional attacks and can allow your PC to be co-opted into botnets for DDoS attacks, spamming and other crimes.
- The installation of scamware programs, such as fake anti-virus scanners, fake Registry cleaners or fake anti-spyware applications. Rogue applications that are security or diagnostic-oriented will tend to create fake system errors as part of their scam to acquire your credit card number.
- Altered system settings, such as exceptions that have been added to your firewall or network ports that have been opened. In most cases, you will not be able to undo these negative changes, until you remove TrojanDropper:Win32/Fedripto.A.
SpywareRemove.com malware researchers encourage the removal of any TrojanDropper:Win32/Fedripto.A with appropriate anti-malware programs, since TrojanDropper:Win32/Fedripto.A will corrupt the Windows Registry and may install other infections that can be difficult to delete without any software-based aid. Several full system scans in Safe Mode may be required to remove all components of a TrojanDropper:Win32/Fedripto.A infection.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:file.exe
File name: file.exeSize: 525.82 KB (525824 bytes)
MD5: 9807c3f8fbc97b0057181f8d147d0fe7
Detection count: 43
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 13, 2011
file.exe
File name: file.exeSize: 811 KB (811008 bytes)
MD5: c8b3331e3ea2fdec386a12945f8104b1
Detection count: 40
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 13, 2011
file.exe
File name: file.exeSize: 569.34 KB (569344 bytes)
MD5: 73e75368afde3b261fad164cbfbbdbfb
Detection count: 39
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 13, 2011
file.exe
File name: file.exeSize: 57.34 KB (57344 bytes)
MD5: 7440734437fa7249c9b7f29b061844e1
Detection count: 38
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 13, 2011
file.exe
File name: file.exeSize: 474.62 KB (474624 bytes)
MD5: 44f06da34fd0b6e7d522566ff4963458
Detection count: 37
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 13, 2011
%temp%\811356.tmp
File name: %temp%\811356.tmpFile type: Temporary File
Mime Type: unknown/tmp
Group: Malware file
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.