TROJ_DROPPR.JET
Posted: May 14, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 9/10 |
|---|---|
| Infected PCs: | 5 |
| First Seen: | May 14, 2012 |
|---|---|
| Last Seen: | February 18, 2022 |
| OS(es) Affected: | Windows |
TROJ_DROPPR.JET is an e-mail-distributed Trojan dropper that displays a Word document about American rapper Adam Yuach to distract victims from its real payload: a second Trojan that connects to various URLs without permission with the intention of compromising your computer's security. While online criminals have seen Adam Yuach's recent death as just another opportunity to exploit for distributing malicious software like TROJ_DROPPR.JET, SpywareRemove.com malware researchers encourage you to shut these propagation tactics down by using common-sense safeguards for unusual e-mail messages, such as using anti-malware software to scan any file attachment before you open it. TROJ_DROPPR.JET, as is the case of most Trojans that exploit e-mail-based distribution techniques, is mislabeled to appear as a harmless text-based file type, which places emphasis on the necessity of not trusting appearances when it comes to files from unusual sources.
TROJ_DROPPR.JET: a Shameless Exploitation of Tragedy for PC Attacks
TROJ_DROPPR.JET is distributed by e-mail messages that claim to offer news about the recent death of Adam Yuach, a member of the famous Beastie Boys band. These e-mail communications pretend to be sent by the International Campaign for Tibet (or ICT) and include that organization's red emblem, along with a photograph of Adam Yuach with the Dalai Lama. An enclosed file attachment appears to be a harmless .doc file, but this file actually contains TROJ_DROPPR.JET. SpywareRemove.com malware researchers note that TROJ_DROPPR.JET does open a legitimate Word document after its launch – presumably to attempt to trick victims into thinking that the e-mail didn't have any malicious content.
However, besides this Word document, TROJ_DROPPR.JET will also install a second PC threat, TROJ_SWYSYN.SME, dubbed winlogin.exe, in an obvious attempt at passing itself off as a Windows component. Non-Windows computers appear to be immune to TROJ_DROPPR.JET, as well as its accompanying Trojan, although SpywareRemove.com malware researchers, nonetheless, warn against opening unusual e-mail files without appropriate precautions, regardless of what brand of operating system you use.
Where TROJ_DROPPR.JET's Story Ends and Other Attacks Begin
TROJ_DROPPR.JET, as a Trojan dropper, is limited to installing its predefined payload. Sadly, the same can't be said of the Trojan TROJ_DROPPR.JET installs, which SpywareRemove.com malware researcher team has found to include several types of attacks. Some issues that can result from a successful TROJ_DROPPR.JET-based installation of TROJ_SWYSYN.SME include:
- A minor loss of system resources due to TROJ_DROPPER.JET's payload launching itself with Windows and remaining open unless closed by force (via security or anti-malware programs, etc).
- Unauthorized contact with remote servers that can be used to transfer your personal information for fraudulent purposes. Alternately, TROJ_SWYSYN.SME may use this server to download and install other malicious programs, depending on its instructions.
The initial file that TROJ_DROPPER.JET uses to install TROJ_SWYSYN.SME is deleted to prevent its detection, and SpywareRemove.com malware experts suggest using suitable anti-malware scanners to find either TROJ_DROPPER.JET or TROJ_SWYSYN.SME.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:file.exe
File name: file.exeSize: 167.15 KB (167153 bytes)
MD5: a6e3fbea1a839cb612a15396d6c35f98
Detection count: 87
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 18, 2022
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.