Malware

AutoIt:Dropper-D [Drp] removal

Malware Removal

The AutoIt:Dropper-D [Drp] is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What AutoIt:Dropper-D [Drp] virus can do?

  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Creates an autorun.inf file
  • Authenticode signature is invalid
  • Attempts to identify installed AV products by registry key
  • Checks for the presence of known devices from debuggers and forensic tools
  • Checks for the presence of known devices from debuggers and forensic tools
  • Detects the presence of Windows Defender AV emulator via files
  • Attempts to disable System Restore
  • Attempts to disable Windows File Protection aka System File Checker.
  • Touches a file containing cookies, possibly for information gathering
  • Attempts to modify or disable Security Center warnings
  • Attempts to modify Explorer settings to prevent file extensions from being displayed
  • Attempts to modify Explorer settings to prevent hidden files from being displayed
  • Yara detections observed in process dumps, payloads or dropped files

How to determine AutoIt:Dropper-D [Drp]?


File Info:

name: 0370D8DB9330DC6534BF.mlw
path: /opt/CAPEv2/storage/binaries/38210d9d27a569a7c57237752fb01b56bc11c4a4241c6d7fcc23e2043cf92e14
crc32: D2F3A995
md5: 0370d8db9330dc6534bfe9ab4e258ecc
sha1: 1f1c6c51aa1333887e3660c2b773a88b0a48fd8e
sha256: 38210d9d27a569a7c57237752fb01b56bc11c4a4241c6d7fcc23e2043cf92e14
sha512: 793d95aa82986dcfe10a610302035cb2f0b2738dd5220ddef3be892b824cc360a6893e5c82c5a81c37ec7f5c7974f6e9fe5ba93de94e36232efb89ddb54970fe
ssdeep: 3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJu:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIv
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1944413C2A6D95AE6ECC619771A23DF841F55FE3169C60A10BA04B16F49F73C1AA13323
sha3_384: a528beecbf9b7ab170edbc80ef04b22c0569f9b9e79fafdb37eef09362d32325a944bf039ce94bf53fe94b77eec47adb
ep_bytes: 60be002046008dbe00f0f9ff57eb0b90
timestamp: 2007-09-10 14:57:50

Version Info:

FileDescription:
Virus.Name.: ., ., ., .
Nuyer.........: ...... .. ...... : ., ., ., .
Translation: 0x0809 0x04b0

AutoIt:Dropper-D [Drp] also known as:

BkavW32.FakeDocD.fam.Trojan
LionicWorm.Win32.AutoIt.l3OL
AVGAutoIt:Dropper-D [Drp]
DrWebWin32.HLLW.Autohit.18448
MicroWorld-eScanTrojan.GenericKD.39797778
FireEyeGeneric.mg.0370d8db9330dc65
CAT-QuickHealWorm.AutoIt.Yuner.A
SkyhighBehavesLike.Win32.Yahlover.dc
ALYacTrojan.GenericKD.39797778
Cylanceunsafe
ZillyaWorm.AutoIt.Win32.16950
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005506171 )
AlibabaWorm:Win32/Yuner.90de48a3
K7GWTrojan ( 005506171 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaAI:Packer.682689CA1D
VirITWorm.Win32.AutoIt.R
SymantecW32.Badday.A
Elasticmalicious (moderate confidence)
ESET-NOD32Win32/Yuner.B
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Trojan.Generic-42
KasperskyWorm.Win32.AutoIt.r
BitDefenderTrojan.GenericKD.39797778
NANO-AntivirusTrojan.Script.Agent.dbvlfz
SUPERAntiSpywareTrojan.Agent/Gen-Yuner
AvastAutoIt:Dropper-D [Drp]
TencentWorm.Win32.AutoRun.f
TACHYONWorm/W32.AutoRun.524706
EmsisoftTrojan.GenericKD.39797778 (B)
F-SecureWorm:W32/AutoIt.gen!A
BaiduAutoIt.Worm.Yuner.a
VIPRETrojan.GenericKD.39797778
TrendMicroWORM_AUTORUN.BWK
Trapminemalicious.high.ml.score
SophosW32/Sohana-CU
IkarusWorm.Win32.AutoRun
JiangminTrojanDownloader.JS.hi
WebrootW32.Yuner.Gen
AviraTR/AutoIt.SB
Antiy-AVLWorm/Win32.Yuner
Kingsoftmalware.kb.b.889
XcitiumWorm.Win32.AutoIt.~AN@1x7nl
ArcabitTrojan.Generic.D25F4412
ViRobotWorm.Win32.AutoIt.261440
ZoneAlarmWorm.Win32.AutoIt.r
GDataWin32.Trojan.PSE.1D362ZP
VaristW32/A-91e93787!Eldorado
AhnLab-V3Win32/Hybris.worm.261539
McAfeeW32/YahLover.worm.o
MAXmalware (ai score=100)
VBA32Worm.Autoit.Autorunner
MalwarebytesGeneric.Trojan.Malpack.DDS
PandaW32/Sohanat.GW.worm
TrendMicro-HouseCallWORM_AUTORUN.BWK
RisingWorm.Win32.AutoIt.bz (CLASSIC)
FortinetW32/Agent.ALS!tr
ZonerWorm.Win32.22192
Cybereasonmalicious.1aa133
DeepInstinctMALICIOUS

How to remove AutoIt:Dropper-D [Drp]?

AutoIt:Dropper-D [Drp] removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment