By | July 10, 2012 | 1 Comment

Trojan.Dropper.BCMiner is a detection for a series of computer Trojan that was made to drop and execute a program called BitCoin. If you are unaware of this software, it is a virtual online currency, which can be use to transact online. It is accepted globally as virtual tokens that can be exchange for goods and services at venue where it is honored.

Once Trojan.Dropper.BCMiner infects a computer, it instantly avails of the computer’s resources for BitCoin mining purposes. The program generates this mining process by using the computational power of the infected PC. This is the reason why cyber criminal are using a Trojan to drop BitCoins to every computer. The more mines they created, the more funds they can generate.

Trojan Dropper BCMiner as BitCoins

When your antivirus program detects a presence of Trojan.Dropper.BCMiner, it denotes that your computer is involved in mining. If you are unaware of this activity, you should remove the program to free up some of computer’s resources. In addition, it is believed that Trojan.Dropper.BCMiner has other payload and that includes browser redirection and stealing of sensitive data.

Type Trojan
Sub-Type Hacking Tool
OS Affected Windows XP, Windows Vista, Windows 7

What are the Symptoms of Trojan.Dropper.BCMiner Infection?

There are no common symptoms generates by this threat aside from a warning message that will initialize by your antivirus program. Although, some may not identify it as a threat, we still suggest that you remove the tool from the infected computer.

Follow these Procedures to Remove Trojan.Dropper.BCMiner

Procedure 1: Start Computer in Safe Mode

Restart your computer in Safe Mode with Networking

- After turning On the power of the computer, just before Windows start, press F8. This is a quick process, so you must press F8 button very timely. Failure to enter this mode will start Windows normally. In that case, you need to turn off the PC again and repeat the process.

- From the selections, choose Safe Mode with Networking. Please use keyboard's arrow up/down to navigate between selections and press Enter to proceed. Safe Mode boots slower than normal and your screen will be in low-resolution format. If it prompts you at boot-up, please proceed to Safe Mode. Loaded driver and processes are minimal so expect that other devices on the computer will not be available during this mode.

SafeMode Networking

Procedure 2: Scan and remove Trojan.Dropper.BCMiner files with MalwareBytes Anti-Malware

To remove Trojan.Dropper.BCMiner, download Malwarebytes Anti-Malware by clicking on the button below. This tool is effective in getting rid of Trojans, viruses and malware.

Download Trojan.Dropper.BCMiner Removal Tool

1. After downloading, please install the program using the default settings.
2. At the end of the installation, please make sure that it will download necessary updates.
3. Once update has completed. The tool will launch.
4. Thoroughly scan the computer and remove all threats detected by this anti-malware program.

Procedure 3: Run TrendMicro's Fake Antivirus Remover (ATTK) to check and delete any remnants of Trojan.Dropper.BCMiner.

As an added help to remove Trojan.Dropper.BCMiner, you can scan the computer with Fake Antivirus Removal Tool. This software is provided and distributed by TrendMicro. Follow this procedure to run a scan with this tool.

1. Download the package by clicking on the button below. This will launch a new browser window that contains further details about the tool.

FakeAVRemover Download Link

2. Save the file to a location on your hard drive.
3. Browse for the location of the file and double-click to run. If you are using Windows Vista or Windows 7, right-click on extracted file supportcustomizedpackage and click on Run as Administrator.

Run FakeAVRemover

4. When program launch, it will run a command prompt to initialize, prepare components, and update the program.
5. Next it will open the graphical user interface (GUI) of Anti-Threat Toolkit.

FakeAVRemover GUI

6. Click on Scan Now. This operation will scan all Trojan.Dropper.BCMiner files and processes in your computer and display a list of result for possible Fake Antivirus program and malware that needs to be removed.

FakeAVRemover Scan

7. Tick all items that are detected by the program, and then click Clean. The tool will start removing Trojan.Dropper.BCMiner components from the computer.
8. If it asked you to restart Windows, please do so.

Procedure 4: Remove Rootkit Trojan with Avast aswMBR

A Trojan often drops malware using an advance technology known as rootkit. It hides the installation of Trojan.Dropper.BCMiner from your anti-virus program and injects malicious code to running Windows processes. To complete the clean-up process, you also need to scan and remove rootkit Trojan.

1. Download aswMBR from Avast server. Save it to your computer.

Avast Rootkit Scanner

2. Double-click on the file aswMBR.exe to run the program.
3. If it prompts you to download the latest Avast! virus definition, please click Yes. This is necessary to identify most recent version of the Trojan as well as hidden files of Trojan.Dropper.BCMiner.

Updating aswMBR

4. Click on Scan button to start checking your computer for presence of rootkit Trojan and other viruses. It will display a message "Scan finished successfully" when done.

aswMBR Scan

5. Click Fix or FixMBR to start removing infection. If aswMBR contains the latest Avast! virus definition file, it will automatically clean infected files on your PC.

Protect your PC from Trojan.Dropper.BCMiner or Similar Attack

Turn On Security Features of your Internet Browser

Internet Explorer - Activate SmartScreen Filter

Internet Explorer versions 8 and 9 has this feature called SmartScreen Filter. It helps detect phishing web sites and protect you from downloading malicious files online. You may have avoided Trojan.Dropper.BCMiner virus if this has been active on your PC. To turn on SmartScreen Filter, follow these steps:

1. Please open Internet Explorer.
2. On top menu, select Tools (IE 9). For IE 8, please look for Safety menu.
3. Select SmartScreen Filter from the drop-down list and click on Turn on SmartScreen Filter.

IE SmartScreen Filter

4. Please restart Internet Explorer.

SEE MORE : Comprehensive steps to activate SmartScreen Filter

Google Chrome's Enable Phishing and Malware Protection

With Google Chrome's Phishing and Malware Detection feature, you will have lesser risks browsing the web. It will display a warning when the site you are trying to visit is suspicious. To enable Phishing and Malware Protection, please do these steps:

1. Open Google Chrome.
2. Click on the Customize and control Google Chrome (3-Bars Icon) located on top right corner of the browser.
3. Select Settings from the drop-down list.
4. Once on the settings page, click on Show advanced settings... at the bottom of the page to see the rest of the Chrome setup.
5. Locate Privacy section and mark 'Enable phishing and malware protection'.

Chrome Security Settings

6. Please restart Google Chrome. New settings keep your browser safe while surfing the web.

SEE MORE : Enable Phishing and Malware Protection on Google Chrome

Mozilla Firefox - Block Attack Sites and Web Forgeries

Phishing and Malware Protection is a built-in feature on Firefox version 3 or later. It warns you when a page you are trying to visit contains phishing content or an attack site designed to drop threats on the computer. To help you keep safe while browsing the Internet using Firefox, please follow this guide:

1. Open Mozilla Firefox browser.
2. On top menu, click on Tools. Then select Options from the list.
3. Select Security and put a check mark on the following items:

  • Warn me when sites try to install add-ons
  • Block reported attack sites
  • Block reported web forgeries

Firefox Security Settings

Remove Trojan.Dropper.BCMiner & Protect Your Computer Now!

Get Protection
30 Day Trial

One thought on “Trojan.Dropper.BCMiner

  1. Kathleen

    Thanks for the easy to follow guide with links. I found 3 trojan viruses on two computers and they are now resolved. After using the tools, Windows would not load on the most infected computer and the Startup Repair could not fix it. I used the Bootrec.exe tool to rebuild the BCD – there is an article in Microsoft support that is easy to follow. I am not IT savvy and was surprised when I was able to resolve this so quickly and efficiently. Norton did not find any of the trojans, but someone on a forum told me that is probably what was causing the issues I was having. May the Universe bless all of you who are so helpful and make things easy to understand.

Leave a Reply

Your email address will not be published. Required fields are marked *