Home Malware Programs Trojans TROJ_MDROP.EVL

TROJ_MDROP.EVL

Posted: August 17, 2012

Threat Metric

Threat Level: 9/10
Infected PCs: 21
First Seen: August 17, 2012
Last Seen: March 24, 2023
OS(es) Affected: Windows

TROJ_MDROP.EVL is an aptly-named Trojan dropper that uses Adobe Flash vulnerabilities to install a second Trojan on your computer. Because TROJ_MDROP.EVL's propagation is handled primarily by e-mail file attachments, SpywareRemove.com malware experts note that avoiding suspicious e-mail-distributed files (or scanning them before opening them) should be considered an effective defense against TROJ_MDROP.EVL's attack, which installed a backdoor Trojan. The Trojan that TROJ_MDROP.EVL installs should be considered a high-level security breach to be removed immediately with your choice of anti-malware scanner, since TROJ_MDROP.EVL includes basic backdoor functionality that could allow a criminal-controlled server to take over your PC.

When Flash SWFs Go Wild with TROJ_MDROP.EVL

TROJ_MDROP.EVL is designed to take advantage of the CVE-2012-1535 Flash vulnerability that allows malicious code to run without your consent. This vulnerability applies to versions of Adobe Flash Player prior to 11.3.300.271 (for Windows or Macs) or 11.2.202.238 (for Linux); Flash Players equal to or more recent than these versions can be considered safe. After TROJ_MDROP.EVL is launched, TROJ_MDROP.EVL uses this exploit to install the backdoor Trojan BKDR_BRIBA.EVL.

However, TROJ_MDROP.EVL still has to be launched before TROJ_MDROP.EVL can perform this attack in the first place. Most reports of TROJ_MDROP.EVL attacks originate with mass-mailed e-mail spam that persuades victims to download a file attachment of TROJ_MDROP.EVL (by claiming that the file is some form of benign file, such as an invoice or business report). SpywareRemove.com malware experts also note that TROJ_MDROP.EVL, rather than being a plain Flash file, actually is a Word file with concealed SWF content, and, as such, may appear to be a harmless text file when you try to open it.

Exorcising TROJ_MDROP.EVL's Special Brand of Evil from Your Hard Drive

TROJ_MDROP.EVL's payload, BKDR_BRIBA.EVL, includes functions that allow it to download and launch malicious files without your permission. Since BKDR_BRIBA.EVL also injects itself into memory processes, SpywareRemove.com malware analysts recommend that you use Safe Mode or a USB flash drive-based system boot to prevent BKDR_BRIBA.EVL from compromising the processes of other programs. Once you've disabled BKDR_BRIBA.EVL, any good anti-malware product should be able to delete TROJ_MDROP.EVL and BKDR_BRIBA.EVL in a system scan. Any scans should be sufficiently thorough that they can detect TROJ_MDROP.EVL and BKDR_BRIBA.EVL, as well as any other PC threats that may be installed by either of these Trojans.

The one spot of good news to a TROJ_MDROP.EVL attack is that, as of the time of this article's writing, BKDR_BRIBA.EVL's server appears to be disabled. This may be a case of the relevant authorities having already caught on to BKDR_BRIBA.EVL's attacks and taken appropriate measures to block it from communicating with its C&C components. However, SpywareRemove.com malware experts also note that there's no certainty that future versions of TROJ_MDROP.EVL's payloads will not simply switch to a fresh server.

TROJ_MDROP.EVL's aliases include MSWord/SWFDropper.A!Camelot, Trojan.Mdropper, Exploit:SWF/ShellCode.G and ARC:Embedded.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%User Profile%\Local Settings\~WORDL.tmp File name: %User Profile%\Local Settings\~WORDL.tmp
File type: Temporary File
Mime Type: unknown/tmp
Group: Malware file
%User Profile%\Application Data\taskman.dll File name: %User Profile%\Application Data\taskman.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Loading...