1. Symantec/
  2. Security Response/
  3. Trojan.Mdropper


Risk Level 1: Very Low

March 19, 2005
November 17, 2015 11:27:04 PM
Systems Affected:
Trojan.Mdropper is a detection name used by Symantec to identify malicious software programs that exploit Microsoft Word or Excel vulnerabilities to drop other malware on to the compromised computer.

A Trojan.Mdropper is a type of Trojan whose purpose is to deliver an enclosed payload onto a destination host computer. A dropper is a means to an end rather than the end itself. In other words, the dropper is usually used at the start or in the early stages of a malware attack.

Once this threat is executed, its own code is simply to load itself into memory and then extract the malware payload and write it to the file system. It may perform any installation procedures and execute the newly dropped malware. The dropper usually ceases to execute at this point as its primary function has been accomplished.

This type of threat is used by malware creators to disguise their malware. They create confusion amongst users by making them look like legitimate Microsoft Word or Excel files. They may also perform actions that mislead the user into thinking that nothing untoward is happening on the computer when in fact the Trojan may have already dropped and executed other malicious software.

If a Symantec antivirus product displays a detection alert for this threat, it means the computer is already protected against this threat and the Symantec product will effectively remove this threat from the computer.

Antivirus Protection Dates

  • Initial Rapid Release version March 19, 2005
  • Latest Rapid Release version March 21, 2018 revision 020
  • Initial Daily Certified version March 19, 2005 revision 007
  • Latest Daily Certified version March 21, 2018 revision 021
  • Initial Weekly Certified release date March 23, 2005
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Writeup By: Jarrad Shearer and Hon Lau

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube