Malware

AutoIt:Dropper-D [Drp] information

Malware Removal

The AutoIt:Dropper-D [Drp] is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What AutoIt:Dropper-D [Drp] virus can do?

  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Creates an autorun.inf file
  • Authenticode signature is invalid
  • Attempts to identify installed AV products by registry key
  • Checks for the presence of known devices from debuggers and forensic tools
  • Checks for the presence of known devices from debuggers and forensic tools
  • Detects the presence of Windows Defender AV emulator via files
  • Attempts to disable System Restore
  • Attempts to disable Windows File Protection aka System File Checker.
  • Touches a file containing cookies, possibly for information gathering
  • Attempts to modify or disable Security Center warnings
  • Attempts to modify Explorer settings to prevent file extensions from being displayed
  • Attempts to modify Explorer settings to prevent hidden files from being displayed
  • Yara detections observed in process dumps, payloads or dropped files

How to determine AutoIt:Dropper-D [Drp]?


File Info:

name: FB4ACAD4EB02E0B16DC1.mlw
path: /opt/CAPEv2/storage/binaries/63390ddcc89c5fe5b8f1e28e511822e0a321fd2c5bee1f8628385a55f12816c7
crc32: C77066E6
md5: fb4acad4eb02e0b16dc1954077af674b
sha1: 90cbb9cd707f49eec399952815808db46eeee28e
sha256: 63390ddcc89c5fe5b8f1e28e511822e0a321fd2c5bee1f8628385a55f12816c7
sha512: f82f92eadb88132720708493ba2d7489a81856e0aaea90209f947b268f970ed343848eed1c2c8d7e5b03ad0254d732c45413fe80f4a5e5ea62ad248da4b64723
ssdeep: 3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ2:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIR
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1CE4412C2A6D95BE5ECC619771A23DF841F56FE3169C60A10BA04B16F49F7381AA13323
sha3_384: 15ce8eab4cf36e617e671b9e09ea3b598f9bfd4942f6acd0a2da700027c2fa3908fbfe84b5a0c53d52026fd634c8d84b
ep_bytes: 60be002046008dbe00f0f9ff57eb0b90
timestamp: 2007-09-10 14:57:50

Version Info:

FileDescription:
Virus.Name.: ., ., ., .
Nuyer.........: ...... .. ...... : ., ., ., .
Translation: 0x0809 0x04b0

AutoIt:Dropper-D [Drp] also known as:

BkavW32.FakeDocD.fam.Trojan
LionicWorm.Win32.AutoIt.l3OL
Elasticmalicious (moderate confidence)
DrWebWin32.HLLW.Autohit.18448
MicroWorld-eScanTrojan.GenericKD.39797778
ClamAVWin.Trojan.Generic-42
FireEyeGeneric.mg.fb4acad4eb02e0b1
CAT-QuickHealWorm.AutoIt.Yuner.A
SkyhighBehavesLike.Win32.Yahlover.dc
ALYacTrojan.GenericKD.39797778
Cylanceunsafe
ZillyaWorm.AutoIt.Win32.16950
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005506171 )
AlibabaWorm:Win32/Yuner.c3d9684f
K7GWTrojan ( 005506171 )
Cybereasonmalicious.4eb02e
BitDefenderThetaAI:Packer.682689CA1D
VirITWorm.Win32.AutoIt.R
SymantecW32.Badday.A
ESET-NOD32Win32/Yuner.B
ZonerWorm.Win32.22192
TrendMicro-HouseCallWORM_AUTORUN.BWK
CynetMalicious (score: 100)
KasperskyWorm.Win32.AutoIt.r
BitDefenderTrojan.GenericKD.39797778
NANO-AntivirusTrojan.Script.Agent.dbvlfz
SUPERAntiSpywareTrojan.Agent/Gen-Yuner
AvastAutoIt:Dropper-D [Drp]
TencentWorm.Win32.AutoRun.f
TACHYONWorm/W32.AutoRun.524835
EmsisoftTrojan.GenericKD.39797778 (B)
F-SecureWorm:W32/AutoIt.gen!A
BaiduAutoIt.Worm.Yuner.a
VIPRETrojan.GenericKD.39797778
TrendMicroWORM_AUTORUN.BWK
Trapminemalicious.high.ml.score
SophosW32/Sohana-CU
IkarusWorm.Win32.AutoRun
JiangminTrojanDownloader.JS.hi
WebrootW32.Yuner.Gen
AviraWORM/Autorun.109873
Antiy-AVLWorm/Win32.Yuner
Kingsoftmalware.kb.b.890
XcitiumWorm.Win32.AutoIt.~AN@1x7nl
ArcabitTrojan.Generic.D25F4412
ViRobotWorm.Win32.AutoIt.261440
ZoneAlarmWorm.Win32.AutoIt.r
GDataWin32.Trojan.PSE.ET15YT
VaristW32/A-91e93787!Eldorado
AhnLab-V3Win32/Hybris.worm.261539
McAfeeW32/YahLover.worm.o
MAXmalware (ai score=100)
VBA32Worm.Autoit.Autorunner
MalwarebytesGeneric.Trojan.Malpack.DDS
PandaW32/Sohanat.GW.worm
APEXMalicious
RisingWorm.Win32.AutoIt.bz (CLASSIC)
YandexTrojan.Autoit.Gen.IN
FortinetW32/Agent.ALS!tr
AVGAutoIt:Dropper-D [Drp]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)
alibabacloudTrojan

How to remove AutoIt:Dropper-D [Drp]?

AutoIt:Dropper-D [Drp] removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment