Troj/DwnLdr-KLB
Posted: December 20, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 1/10 |
|---|---|
| Infected PCs: | 105 |
| First Seen: | December 20, 2012 |
|---|---|
| Last Seen: | July 23, 2020 |
| OS(es) Affected: | Windows |
Troj/DwnLdr-KLB is a Trojan downloader that's designed to contact a remote server and, from it, download other forms of malware that can be used in additional attacks against your computer. Currently, Troj/DwnLdr-KLB attacks are associated with a variant of WM97/ExeDrop-G, a macro-abusing spreadsheet that exploits the macro feature of Windows Office to install other malicious software. Known versions of WM97/ExeDrop-G include both a Sudoku generator and a sermon about the Mayan apocalypse and SpywareRemove.com malware experts strongly discourage enabling macros for suspicious documents. Fortunately, modern versions of Windows disable macros by default, but if your PC is exposed to Troj/DwnLdr-KLB, you should use anti-malware programs to remove Troj/DwnLdr-KLB, WM97/ExeDrop-G and any other related malware from your computer.
Troj/DwnLdr-KLB: A Backup Attack for When Sudoku Fails to Get the Job Done
Troj/DwnLdr-KLB operates very similarly to another WM97/ExeDrop-G-distributed Trojan, Troj/DwnLdr-KLI. In either case, the victim downloads and launches WM97/ExeDrop-G under the assumption that WM97/ExeDrop-G is safe content and WM97/ExeDrop-G then uses the macro feature (which must be enabled before its content is displayed) to install either Troj/DwnLdr-KLB or Troj/DwnLdr-KLI. Previously, SpywareRemove.com malware experts took note of variants of WM97/ExeDrop-G that were disguised as Sudoku games, but the version of WM97/ExeDrop-G that installs Troj/DwnLdr-KLB is disguised as something entirely different: a preacher's blog post about the Mayan prophecy of the supposedly upcoming end of the world.
Unlike the relatively clever Sudoku variant of WM97/ExeDrop-G, this new version of WM97/ExeDrop-G doesn't provide tips on how to enable macros (which, as of an old Windows patch, have been disabled by default), nor does WM97/ExeDrop-G provide any reason why you'd need to enable macros to view its content. However, if you do make the mistake of trustingly enabling macros, Troj/DwnLdr-KLB will be installed and will contact a remote server, thereby allowing Troj/DwnLdr-KLB to install other threats (or be configured for different types of attacks).
Why a Stalled Troj/DwnLdr-KLB Assault Shouldn't Set Your Mind at Ease
Due to the strong similarity between Troj/DwnLdr-KLB and similar PC threats, many PC security experts have speculated that the delivery systems are semi-automated as opposed to being individually designed. As a result, SpywareRemove.com malware experts expect to see many more macro-based Trojan attacks like Troj/DwnLdr-KLB's own in the future. Naturally, the safest thing you can do to protect your PC from Troj/DwnLdr-KLB is never to enable macros for files that you've acquired from suspicious sources.
On the bright side, the server that appears to offer Troj/DwnLdr-KLB's current payload is, at this time, failing to respond to Troj/DwnLdr-KLB's queries. This makes it unlikely that Troj/DwnLdr-KLB will be unable to harm your PC if you remove Troj/DwnLdr-KLB with anti-malware software as quickly as possible. However, since these circumstances may change at any time, SpywareRemove.com malware experts certainly don't recommend that you ignore any possible Troj/DwnLdr-KLB infection on your computer.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:Copy of Adupdate.exe
File name: Copy of Adupdate.exeSize: 89.6 KB (89600 bytes)
MD5: 0581bb6c841830e1a9814aa99281eaed
Detection count: 15
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: January 7, 2013
c02f84476f726133ed548dadea84970f.virus
File name: c02f84476f726133ed548dadea84970f.virusSize: 106.49 KB (106496 bytes)
MD5: c02f84476f726133ed548dadea84970f
Detection count: 13
Mime Type: unknown/virus
Group: Malware file
Last Updated: January 7, 2013
VBA[X].exe
File name: VBA[X].exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
Wmupdate.exe
File name: Wmupdate.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.