Trojan.GootKit will arrived on a computer as a malicious link attached to a spammed email messages. When executed, it will gather sensitive information from an infected computer such as user name and password. Trojan.GootKit can also allow a remote attacker to gain access on the compromised computer and download additional threats.
Alias: Backdoor.Trojan, Downloader, Packed.Cupx!gen5, Trojan Horse, Trojan.Dropper, Trojan.Gen, W32.Ircbrute
Damage Level: Low
Systems Affected: Windows 9x, 2000, XP, Windows Vista
When Trojan.GootKit is executed, it will drop a malicious DLL file under Windows directory. It also allows automatic start-up by adding an entry on Windows registry.
The Trojan will access a remote server to download a C&C (Command and Control) configuration file to perform additional tasks including the following:
- Communicate with a specified remote computer
- Download and run files from a distant server
- Steal sensitive information like user name, password, computer information and network data
- Embed malicious Java Script code into HTML files
- Start and stop any running processes
- Create, modify and delete any Windows registry subkeys
- List, create and delete computer files
- Send gathered information to a remote attacker using FTP and email transmission
Trojan.GootKit propagates by mass sending a spam email messages that contains malicious links pointing to Trojan location. It may also spread by stealing FTP (File Transfer Protocol) accounts and infecting HTML files on the web site.
How to Remove Trojan.GootKit
Step 1 : Run a scan with your antivirus program
1. Temporarily Disable System Restore if your system is running on Windows Me/XP. [how to]
2. Start Windows in Safe Mode with Networking.
- From a power-off state, turn on the computer and press F8 on your keyboard repeatedly.
- Your computer will display Windows Advanced Boot Options menu. Select Safe Mode with Networking.
- Windows will boot loading only necessary drivers and system files. Expect that it will run with minimal features and low-resolution display.
3. Open your antivirus program and download the most recent update. This method ensures that your antivirus program can detect even newer variants of Trojan.GootKit.
Updating your antivirus software is a one-click process. Please refer to your software manual for complete instructions.
4. Once updating is finished, run a full system scan. After the scan, delete all infected items. If unable to clean or delete, better place the threat in quarantine.
Step 2: Run another test with online virus scanner
Another way to remove Trojan.GootKit without the need to install additional antivirus software is to perform a thorough scan with free online virus scanner. It can be found on websites of legitimate antivirus and security provider.
1. Click the button below to proceed to the list of suggested Online Virus Scanner. Choose your desired provider. You can run each scan individually, one at a time, to ensure that all threats will be removed from the computer. This may require plug-ins, add-on or Activex object, please install if you want to proceed with scan.
2. After completing the necessary download, your system is now ready to scan and remove Trojan.GootKit and other kinds of threats.
3. Select an option in which you can thoroughly scan the computer to make sure that it will find and delete entirely all infections not detected on previous scan.
4. Remove or delete all detected items.
5. When scanning is finished, you may now restart the computer in normal mode.
Alternative Removal Procedures for Trojan.GootKit
Option 1 : Use Windows System Restore to return Windows to previous state
If Trojan.GootKit enters the computer, there is a big chance that Windows files, registry entries and other essential components are also infected. System Restore can reinstate clean system files by restoring the configuration to an earlier date. The method also replaces compromised files with a clean version. If you have a saved restore point before Trojan.GootKit infiltrates the PC, we highly encourage you to execute this procedure if none of the above works.
To verify if System Restore is active on your computer, you can type system restore into the Start menu search box. Typing rstrui on the same box and pressing Enter also opens this function.
If previous restore point is saved, you may proceed with Windows System Restore. Click here to see the full procedure.
Option 2 : Trojan.GootKit manual uninstall guide
IMPORTANT! Manual removal of Trojan.GootKit requires technical skills. Deleting system files and registry entries by mistake may result to total disability of Windows system. We advise you to perform a backup of registry before proceeding with this guide.
1. Kill any running process that belongs to Trojan.GootKit.
- Press Ctrl+Alt+Del on your keyboard.
- When Windows Task Manager appears, look for Trojan.GootKit files (refer to Technical Reference) and click End Process.
2. Delete all registry entries that belong to this malware.
- Press [Windows Key]+R on your keyboard.
- In the 'Open' dialog box, type regedit and press Enter. This will open registry editor.
- Find and delete registry entries as mentioned in Technical Reference section below.
- Close registry editor. Changes made will be save automatically.
3. Scan the computer with antivirus program.
- Connect to Internet and open your antivirus software. Please update to obtain the latest database and necessary files.
- Restart the computer in Safe Mode.
- Just before Windows logo begins to load press F8 on your keyboard.
- On Windows Advanced Boot Options, select Safe Mode and press Enter.
4. Delete all files dropped by Trojan.GootKit.
- While still in Safe Mode, search and delete malicious files. Please refer to 'Technical Reference'. Make sure that you execute 'End Task' first before deleting the file. Otherwise, the system will not let you perform this action.
Technical ReferenceAssociated Files and Folders:Added Registry Entries:
Ways to Prevent Trojan.GootKit Infection
Take the following steps to protect the computer from threats. Suggested tools and security setup within installed software helps prevent the same attack on your PC.