LTS Secure Warning: How To Remove Trojan dropper

Downloader’s and droppers are helper programs for various types of malware such as Trojans and root-kits. Usually they are implemented as scripts (VB, batch) or small applications.

They don’t carry any malicious activities by themselves, but just open a way for attack by downloading/decompressing and installing the core malicious modules. To avoid detection, a dropper may also create noise around the malicious module by downloading/decompressing some harmless files. Very often, they auto-delete themselves after the goal has been achieved.

Technical Details

Downloader’s and droppers emerged from the idea of malware files that were able to download additional modules (i.e. Agobot, released in 2002).

An interesting example of a modern downloader is OnionDuke (discovered in 2014), carried by infected Tor nodes. It is a wrapper over legitimate software. When a user downloads software via an infected Tor proxy, OnionDuke packs the original file and adds a malicious stub to it. When the downloaded file is run, the stub first downloads malware and installs it on a computer, and then unpacks the legitimate file and removes itself in order to be unnoticed.


Downloader’s often appear in non-persistent form. They install the malicious module and remove themselves automatically. In such a case, after a single deployment they are no longer a threat. If for some reason they haven’t removed themselves, they can be deleted manually.

More dangerous variants are persistent. They copy themselves to some random, hidden file and create registry keys to run after the system is restarted, attempting to download the malicious modules again. In such cases, to get rid of the downloader it is necessary to find and remove the created keys and the hidden file.

What remains to do is to take appropriate steps in order to neutralize the real weapon carried by the dropper. The difficulty level of cleaning the system varies as the payload may be of different types. The most universal way is to use good quality, automated anti-malware tools and run a full system scan.

Recommended Actions

Keeping good security habits, such as being careful about visiting certain websites and not opening unknown attachments minimizes the risk of being affected by malicious downloader’s. However, in some cases it is not enough. Exploit kits can still install the malicious software on the vulnerable machine, even without any interaction. That’s why it is important to have good quality anti-malware software.

For more details, click on the link.

LTS Secure Locations
  • Florida: 407-965-5509
    Los Angeles: 323-544-5013
    Mid West: 800 689 4506

  • Chicago/Midwest– 2406 Schumacher Drive, Mishawaka, IN, 46545

    201, Tower S4, Phase II, Cybercity, Magarpatta Township, Hadapsar, Pune-411013

Leave us a messages Leave us a messages

← Prev Step

Thanks for contacting us. We'll get back to you as soon as we can.

Please provide a valid name, email, and question.

Powered by LivelyChat
Powered by LivelyChat Delete History