From: Jenn on

"~BD~" <BoaterDave~no.spam~@hotmail.co.uk> wrote in message
news:EfmdnUEcoPqFxnvWnZ2dnUVZ7v6dnZ2d(a)bt.com...
> Jenn wrote:
>> "FromTheRafters"<erratic(a)nomail.afraid.org> wrote in message
>> news:hqs1gd$lj1$1(a)news.eternal-september.org...
>>> "Jenn"<nope(a)noway.atnohow.anyday> wrote in message
>>
>>>>> It is a trojan, unless it self-replicates, in which case it is called
>>>>> a
>>>>> virus, unless it doesn't *need* to infect programs in order to
>>>>> replicate
>>>>> and spread, in which case it is a worm.
>>>>>
>>>>> It bears keeping in mind that just because something is undesired,
>>>>> doesn't make it *malicious*. Just because something replicates,
>>>>> doesn't
>>>>> mean it is *malicious*. Just because it infects, doesn't make it
>>>>> *malicious* (but you would be hard pressed to find an example of
>>>>> non-malicious infection).
>>>
>>> Is there anything specific in there that you want claified?
>>>
>>
>>
>> Have you heard of something called: Trojan.Dropper ? What is it? One
>> of
>> the computers I use had it on there but Malwarbytes got rid of it.
>>
>
> Hi Jenn :)
>
> A Trojan.Dropper is a type of Trojan whose purpose is to deliver an
> enclosed payload onto a destination host computer. A dropper is a means to
> an end rather than the end itself. In other words, the dropper is usually
> used at the start or in the early stages of a malware attack.
>
> Once a dropper is executed, its own code is simply to load itself into
> memory and then extract the malware payload and write it to the file
> system. It may perform any installation procedures and execute the newly
> dropped malware. The dropper usually ceases to execute at this point as
> its primary function has been accomplished.
>
> Droppers are used by malware creators to disguise their malware. They
> create confusion amongst users by making them look like legitimate
> applications or well known and trusted files.
>
> They may also perform actions that mislead the user into thinking that
> nothing untoward is happening on the computer when in fact the Trojan may
> have already dropped and executed other malicious software.
>


Thanks Dave! see my response to you and Rafter on the same post.

--
Jenn (from Oklahoma)


From: David H. Lipman on
From: "Jenn" <nope(a)noway.atnohow.anyday>


| "FromTheRafters" <erratic(a)nomail.afraid.org> wrote in message
| news:hs636u$qhk$1(a)news.eternal-september.org...
>> "Jenn" <nope(a)noway.atnohow.anyday> wrote in message
>> news:hs5dcp$b7v$1(a)news.eternal-september.org...

>>> "FromTheRafters" <erratic(a)nomail.afraid.org> wrote in message
>>> news:hqs1gd$lj1$1(a)news.eternal-september.org...
>>>> "Jenn" <nope(a)noway.atnohow.anyday> wrote in message

>>>>>>It is a trojan, unless it self-replicates, in which case it is called a
>>>>>>virus, unless it doesn't *need* to infect programs in order to
>>>>>>replicate
>>>>>>and spread, in which case it is a worm.

>>>>>>It bears keeping in mind that just because something is undesired,
>>>>>>doesn't make it *malicious*. Just because something replicates, doesn't
>>>>>>mean it is *malicious*. Just because it infects, doesn't make it
>>>>>>*malicious* (but you would be hard pressed to find an example of
>>>>>>non-malicious infection).

>>>> Is there anything specific in there that you want claified?



>>> Have you heard of something called: Trojan.Dropper ? What is it? One of
>>> the computers I use had it on there but Malwarbytes got rid of it.

>> Trojan.Dropper can refer to the initial non-replicating trojan that drops
>> a virus (for instance a germ file that pretends to be a screen saver) or
>> one that drops another non-replicating malware instance. Something like a
>> trojan downloader except that instead of downloading and executing the
>> additional malware it carries it within itself as a deliverable payload.



| To both BD and Rafter...

| It did behave like it was asking me to install a virus program, which I
| didn't respond to anything except X out of the window... it wouldn't let me
| run malwarebytes initially so I rebooted into safe mode, did a restore point
| that was a few weeks ago, and booted normally... then I could run
| malwarebytes... and if found the trojan.dropper and it deleted it. I
| rebooted again ... and ran malwarebytes a 2nd time and nothing was found.
| That was yesterday afternoon. Last night I did an update on malwarebytes to
| make sure I had the most recent version and then did a 3rd scan and nothing
| showed up.

| Could I have gotten that from a link I opened that had a malvertizement in
| it?

High probability of being - Yes.

--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


From: Jenn on

"David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in message
news:hs6n5a0f9(a)news2.newsguy.com...
> From: "Jenn" <nope(a)noway.atnohow.anyday>
> | To both BD and Rafter...
>
> | It did behave like it was asking me to install a virus program, which I
> | didn't respond to anything except X out of the window... it wouldn't let
> me
> | run malwarebytes initially so I rebooted into safe mode, did a restore
> point
> | that was a few weeks ago, and booted normally... then I could run
> | malwarebytes... and if found the trojan.dropper and it deleted it. I
> | rebooted again ... and ran malwarebytes a 2nd time and nothing was
> found.
> | That was yesterday afternoon. Last night I did an update on
> malwarebytes to
> | make sure I had the most recent version and then did a 3rd scan and
> nothing
> | showed up.
>
> | Could I have gotten that from a link I opened that had a malvertizement
> in
> | it?
>
> High probability of being - Yes.



I thought I got out of the malvertizement before it got me... Is there a
way to avoid such things?
--
Jenn (from Oklahoma)


From: David H. Lipman on
From: "Jenn" <nope(a)noway.atnohow.anyday>


| "David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in message
| news:hs6n5a0f9(a)news2.newsguy.com...
>> From: "Jenn" <nope(a)noway.atnohow.anyday>
>> | To both BD and Rafter...

>> | It did behave like it was asking me to install a virus program, which I
>> | didn't respond to anything except X out of the window... it wouldn't let
>> me
>> | run malwarebytes initially so I rebooted into safe mode, did a restore
>> point
>> | that was a few weeks ago, and booted normally... then I could run
>> | malwarebytes... and if found the trojan.dropper and it deleted it. I
>> | rebooted again ... and ran malwarebytes a 2nd time and nothing was
>> found.
>> | That was yesterday afternoon. Last night I did an update on
>> malwarebytes to
>> | make sure I had the most recent version and then did a 3rd scan and
>> nothing
>> | showed up.

>> | Could I have gotten that from a link I opened that had a malvertizement
>> in
>> | it?

>> High probability of being - Yes.



| I thought I got out of the malvertizement before it got me... Is there a
| way to avoid such things?

Not really as you don't know the specifics.


--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


From: FromTheRafters on
"Jenn" <nope(a)noway.atnohow.anyday> wrote in message
news:hs6jtt$sc$1(a)news.eternal-september.org...

[...]

> To both BD and Rafter...
>
> It did behave like it was asking me to install a virus program, which
> I didn't respond to anything except X out of the window... it wouldn't
> let me run malwarebytes initially so I rebooted into safe mode, did a
> restore point that was a few weeks ago, and booted normally... then I
> could run malwarebytes... and if found the trojan.dropper and it
> deleted it. I rebooted again ... and ran malwarebytes a 2nd time and
> nothing was found. That was yesterday afternoon. Last night I did an
> update on malwarebytes to make sure I had the most recent version and
> then did a 3rd scan and nothing showed up.
>
> Could I have gotten that from a link I opened that had a
> malvertizement in it?

Yes, or any number of other ways that they use to foist this scareware
upon users.

I think you have done well in this case, some variations of scareware
disable or corrupt your restore capability - *and* prevent safe mode
access.


First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5
Prev: antivir za win98
Next: Ping: David Kaye