Threat Database Trojans TrojanDropper:Win32/Rovnix.I

TrojanDropper:Win32/Rovnix.I

By Sumo3000 in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 7
First Seen: July 26, 2013
Last Seen: March 18, 2020
OS(es) Affected: Windows

TrojanDropper:Win32/Rovnix.I is a Trojan downloader that is used to install other threats on the affected PC. As reported by malware researchers, TrojanDropper:Win32/Rovnix.I has been utilized lately in various Trojan attacks. Trojan downloaders like TrojanDropper:Win32/Rovnix.I are essential parts of the threat distribution system. Trojans are known by the fact that they cannot distribute or spread themselves. Unlike viruses that corrupt executable files in order to ensure that multiply on the affected PC, or worms, which may utilize removable memory devices and other paths to spread from one PC to the next, Trojans use the victims themselves or rely on other threats to spread from one PC to another. These threats are known as 'Trojans' because the Trojan Horse from the Iliad used similar tactics as these types of threats. Trojans enter a computer disguised as a beneficial file and then release a payload or a hidden unsafe component. Trojan downloaders like TrojanDropper:Win32/Rovnix.I are specific threats concocted to deliver Trojans to the affected PC, connecting to a third party and downloading and installing the harmful component on the affected PC.

What are the Risks When TrojanDropper:Win32/Rovnix.I Invades a Computer

Malware researchers have detected recently various attacks that use a threatening, modified version of the infamous Zeus Trojan. TrojanDropper:Win32/Rovnix.I has also been associated with a known Twitter spam tactic that involves spamming corrupted links disguised as tweets from journalists or other high profile targets. TrojanDropper:Win32/Rovnix.I has been used in many previous attacks involving the Upatre Trojan and its many variants. TrojanDropper:Win32/Rovnix.I belongs to the Upatre family of threats and is considered extremely harmful by security researchers.

TrojanDropper:Win32/Rovnix.I itself is contained in a very small file, and TrojanDropper:Win32/Rovnix.I carries its operation simply, efficiently and with considerable stealth. Essentially, this Trojan dropper connects to a specific server using an encrypted SSL connection and then downloads and installs threats on the victim's computer. Once this is done, TrojanDropper:Win32/Rovnix.I removes all traces of itself, making the work of malware analysts considerably more difficult. TrojanDropper:Win32/Rovnix.I itself is distributed using corrupted email attachments particularly programmed to deceit novice PC users into opening compromised files that include TrojanDropper:Win32/Rovnix.I's harmful code as well as through corrupted links distributed through social media. Typical examples of unsafe email attachments associated with this threat include bogus receipts or news items, often referencing real-life companies or businesses.

Trending

Most Viewed

Loading...