Threat Database Trojans Trojan.Dropper.Dapato

Trojan.Dropper.Dapato

By GoldSparrow in Trojans

Threat Scorecard

Ranking: 12,982
Threat Level: 80 % (High)
Infected Computers: 6,622
First Seen: August 5, 2011
Last Seen: September 4, 2023
OS(es) Affected: Windows

The Trojan.Dropper.Dapato program is classified as a Trojan that is programmed to show advertisements on the screen of infected users and generate Internet traffic to unreliable search engines. The Trojan.Dropper.Dapato program was reported for the first time by users in Poland, and the threat appears to target users in Central and Western Europe predominantly. Computer users may install the Trojan.Dropper.Dapato with a corrupted free software bundle, which may include adware like PubHotspot and riksware such as YTDownloader. We have detected that the Trojan.Dropper.Dapato is often found on infected computers in the company of the Vnlgp Miner, which is a legitimate program that is abused by threat authors who claim revenue from processing online payments using the hardware resources of compromised machines. The Trojan.Dropper.Dapato program can be found in:

C:\Documents and Settings\All Users\Application Data\TeamViewer_Tracer.exe

The file is likely to be hidden within the Windows Explorer. Unless you have enabled the 'Show Hidden Files' in the file manager, you mаy not spot the Trojan.Dropper.Dapato. Additionally, the Trojan is seen to create the following files in the AppData directory:

C:\Documents and Settings\All Users\Application Data\log.ewbb
C:\Documents and Settings\All Users\Application Data\log.ewbt

As stated before, the Trojan.Dropper.Dapato is programmed to generate ads and may redirects users to insecure search engines. Researchers found that the Trojan.Dropper.Dapato Trojan may exchange data packets with servers hosted on the following domains:

  • 12kotov.ru
  • initialpage123.com
  • maniver.ru
  • noblok.org
  • qtipr.com

The transmissions are accomplished via a hidden instance of the default browser on your system. The Trojan.Dropper.Dapato Trojan might inject a corrupted DLL in Google Chrome and Mozilla Firefox to facilitate its operations. Moreover, the threat adds a Registry entry and a link to the Startup folder to enable its automatic start with Windows. Samples of the Trojan.Dropper.Dapato revealed that the file might come with a valid digital certificate, which may allow it to bypass the native certificate scanner on Windows 10. Computer users that are infected with the Trojan.Dropper.Dapato Trojan may notice that their browser shows pop-up advertisements and there are redirects from time to time. Extensions like Adblock Plus and uBlock Origin are unlikely to suppress the activity of the Trojan.Dropper.Dapato, and it is best to use a reliable anti-malware tool to clean your machine. AV scanners may detect files related to the Trojan.Dropper.Dapato as:

  • BackDoor.Radmin.150
  • HEUR/QVM07.1.4C7E.Malware.Gen
  • ML.Attribute.HighConfidence
  • UDS:DangerousObject.Multi.Generic
  • a variant of Win32/Kryptik.FQVT
  • malicious_confidence_71% (D)
  • virus.win32.parite.b

SpyHunter Detects & Remove Trojan.Dropper.Dapato

File System Details

Trojan.Dropper.Dapato may create the following file(s):
# File Name MD5 Detections
1. spoolsc.exe 21ee45b249954072e602a7d50db6a5e3 25
2. wdacl.exe db453cc209f0577830f35203fc8c800a 9
3. spoolsc.exe 0848c3bb5050da344ed0c551c98b0ba7 6
4. spoolsc.exe 2e14a731475a7e8aa4f0d3a7f52e5643 3
5. wdacl.exe 6fbd102b5a0a4753ac9cf0554324f0cd 2
6. spoolsc.exe e6cde37176f0d29ce919586739f6b9b1 2
7. wdacl.exe 400c4960ae14565caacdfb6f3381fcde 1
8. wdacl.exe b5eede0d712f5338bace185e6fb45261 1
9. wdacl.exe f4c07ec5d78bc4818938d3f97eaf16d5 1
10. wdacl.exe 09a652fe954b17c30a9dbae6db49837e 1
11. spoolsc.exe e89906af6bee4e2f5120b4c348d86e31 1
12. spoolsc.exe 3398462231e58f8855c289cdc319f771 1
13. spoolsc.exe 2d7b8940303fa628d8b71512ba61c8b5 1
14. spoolsc.exe 5111d001f3b51e595b276e06108abf5c 1
15. spoolsc.exe 3b4372705a7e7bb21a570a33a145e26b 1
16. file.exe 54bad3613bdf02e3ba1375c9b047e1b6 1

Registry Details

Trojan.Dropper.Dapato may create the following registry entry or registry entries:
File name without path
new folder .exe
Regexp file mask
%ALLUSERSPROFILE%\Application Data\tw[NUMBERS].exe
%ALLUSERSPROFILE%\TeamViewer_Tracer.exe
%ALLUSERSPROFILE%\tw[NUMBERS].exe
%APPDATA%\Adobe\HostService.exe
%APPDATA%\serviceapp.exe
%APPDATA%\Smart Security\smartsecurity.exe
%APPDATA%\Win Update.exe

Trending

Most Viewed

Loading...