Hacktool.Stonedbootkit and Boot.Stonedbootkit

If your computer is infected with Hacktool.Stonedbootkit and Boot.Stonedbootkit, you may follow the procedure on this page to contain the threat. Remove these Trojan at once before it can further harm the system.

Hacktool.Stonedbootkit is a Trojan designed to drop a copy of Boot.Stonedbootkit. Hacktool.Stonedbootkit will replace the master boot record (MBR) with its own code to gain control of the infected computer.

While, Boot.Stonedbootkit is a boot sector virus installed by Hacktool.Stonedbootkit. The two are separate Trojans that targets Master Boot Record on victim’s PC. However, both share the same goal and that is to gain full access to the affected system.

Alias: StonedBootkit

Damage Level: High

Systems Affected: Windows 9x, 2000, XP, Windows Vista

Characteristics
When executed, Stonedbootkit will drop numerous files and folders to the compromised system. They are placed under the folder ‘Stoned’, which is located on System Drive folder. It also creates a Plugin folder where it will store malware components.

It will make a backup copy of the original Master Boot Record (MBR) on the following location:
SystemDrive%\Stoned\Master Boot Record.bak

To take control of the PC, this Trojan will replace the existing MBR with its own. With this method, the Trojan can now hook various system files and malicious code that overrides existing security privileges.

Once the Trojan accomplishes its tasks, it may notify the attacker about the infection. Then, attacker may use Stonedbootkit to gain full access on the compromised PC.

Distribution
Hacktool.Stonedbootkit primarily spread through spam operation. It is either in the form of email or Internet campaign. The Trojan will infect web site through vulnerabilities. Then, it will inject a code commonly used to process drop-by-download method to infect visitors. Authors of this Trojan also embed the code into downloadable executable files that are mostly hosted on unsecured file-sharing networks or peer-to-peer connection.

How to Remove Hacktool.Stonedbootkit and Boot.Stonedbootkit

1. Temporarily Disable System Restore if you are using Windows XP. For Windows Vista/7 users, you may use System Restore to return Windows to a previous clean state. However, you must have a saved restore points to accomplish this. Otherwise, proceed with the removal process.

2. To be able to identify even the most recent variant of Hacktool.Stonedbootkit, open your antivirus application and update the virus definition file.

3. Start Windows in Safe Mode with Networking.
- From a power-off state, turn on the computer and press F8 on your keyboard repeatedly.
- Your computer will display Windows Advanced Boot Options menu. Please select Safe Mode with Networking.
- The system will now boot Windows and loads only necessary drivers and files.

4. Open your antivirus program and run a full system scan. After the scan, delete all infected items. If unable to delete, better place them in quarantine. Once the scan is complete, please proceed with the next step.

Scan with Norton Power Eraser:

Additional virus removal tool like Norton Power Eraser provides deep scanning technology to eliminate other threats not detected by a normal virus scan. Use this tool with extra caution.

5. Go to this link and download Norton Power Eraser.
6. Once the download completes, double click on the file NPE.exe to run the program.
7. It will prompt for End User License Agreement, click on Accept to continue.
8. On NPE main window, click on Scan. Then select Exclude Rootkit Scan. Click on Continue to proceed.
9. Virus scanning may take some time. After running the scan, NPE will display the scan result.

Important! If there are any detected threats under Suspicious, remove the check mark. Only threats in Detected category are necessary to remove at this point. Make sure that you mark the Create System Restore Point before proceeding with the fix.

10. Now click on Fix to start removing the threats including Hacktool.Stonedbootkit remnants if there are any.
11. When done, Norton Power Eraser will restart the computer. Then after a reboot, it will initialize and display the eliminated threats.
12. You may now close Norton Power Eraser.

Alternative Removal Method for Hacktool.Stonedbootkit and Boot.Stonedbootkit

Option 1 : Use Windows System Restore to return Windows to previous state

If Hacktool.Stonedbootkit and Boot.Stonedbootkit enters the computer, there is a big chance that Windows files, registry entries and other essential components are also infected. System Restore can reinstate clean system files by restoring the configuration to an earlier date. The method also replaces compromised files with a clean version. If you have a saved restore point before Hacktool.Stonedbootkit and Boot.Stonedbootkit infiltrates the PC, we highly encourage you to execute this procedure if none of the above works. You may proceed with Windows System Restore, click here to see the full procedure.

Option 2 : Hacktool.Stonedbootkit and Boot.Stonedbootkit manual uninstall guide

IMPORTANT! Manual removal of Hacktool.Stonedbootkit and Boot.Stonedbootkit requires technical skills. Deleting system files and registry entries by mistake may result to total disability of Windows system. We advise you to perform a backup of registry before proceeding with this guide.

1. Kill any running process that belongs to Hacktool.Stonedbootkit and Boot.Stonedbootkit.
- Press Ctrl+Alt+Del on your keyboard.
- When Windows Task Manager appears, look for Hacktool.Stonedbootkit and Boot.Stonedbootkit files (refer to Technical Reference) and click End Process.

End Task

2. Delete all registry entries that belong to this malware.
- Press [Windows Key]+R on your keyboard.
- In the 'Open' dialog box, type regedit and press Enter. This will open registry editor.
- Find and delete registry entries as mentioned in Technical Reference section below.
- Close registry editor. Changes made will be save automatically.

Run Regedit

3. Scan the computer with antivirus program.
- Connect to Internet and open your antivirus software. Please update to obtain the latest database and necessary files.
- Restart the computer in Safe Mode.
- Just before Windows logo begins to load press F8 on your keyboard.
- On Windows Advanced Boot Options, select Safe Mode and press Enter.

4. Delete all files dropped by Hacktool.Stonedbootkit and Boot.Stonedbootkit.
- While still in Safe Mode, search and delete malicious files. Please refer to 'Technical Reference'. Make sure that you execute 'End Task' first before deleting the file. Otherwise, the system will not let you perform this action.

Technical Reference

Associated Files and Folders: