Trojan.Mebroot is a deadly Trojan that can modify and infect Master Boot Record (MBR) of hard-drive. This Trojan can hide its presence by utilizing a complex rootkit technology. Trojan.Mebroot will infect the Master Boot Record (MBR) of the hard drive where boot-strapping of the operating system occurs. When starting the computer, infected MBR is loaded so as the Trojan that became a part of it. This method makes the harmful Trojan memory-resident. Trojan.Mebroot can now execute its own code that will load specific rootkit-driver and execute other malware that were dropped on the compromised computer.
Trojan.Mebroot may arrive on the system in a variety of ways. It primarily propagate on web sites that will take advantage of Internet browser’s vulnerability. Visiting these sites can download the Trojan without the knowledge of user. Fake multimedia web site that offers online adult movies are also responsible to broaden the infection of Trojan.Mebroot. The Trojan will disguise as a required player or decoder needed to watch movie which is actually non-operative. Additionally, Trojan.Mebroot is famously distributed as software cracks and key generators on file-sharing networks. Malicious files are deliberately uploaded by malware authors and shared as useful tool to completely run an unlicensed program.
Alias: StealthMBR, Stealth MBR rootkit
Threat Level: High
Systems Affected: Windows 9x, 2000, XP, Windows Vista/7
How to Remove Trojan.Mebroot
Systematic procedures to get rid of the threat are presented on this section. Make sure to scan the computer with suggested tools and scanners.
NOTE: We suggest that you PRINT or BOOKMARK this guide. There are steps that we may have to restart the computer in order to successfully remove the threat.
Optional : Scan and remove Trojan.Mebroot with this special tool
1. Temporarily Disable System Restore if your system is running on Windows Me/XP. [how to]
2. Start Windows in Safe Mode with Networking.
- From a power-off state, turn on the computer and press F8 on your keyboard repeatedly.
- Your computer will display Windows Advanced Boot Options menu. Select Safe Mode with Networking.
- Windows will boot loading only necessary drivers and system files. Expect that it will run with minimal features and low-resolution display.
Anti-rootkit utility called TDSSKiller is a free tool from Kasperksy that neutralizes complicated malware which effectively hides its process, folders, files and registry entries.
3. Click the button to download TDSSKiller from Kaspersky's official web site. Save the file to your desktop.
4. Extract the contents using archiver applications.
5. Locate and run the TDSSKiller.exe file.
6. On Object to Scan, please mark Services and drivers as well as Boot Sectors.
7. Click on Start Scan to begin scanning your system. This may take a while.
8. After the scan is finished, it will reboot the computer. Continue with the steps to further test the computer for virus infection.
Step 1 : Run a scan with your antivirus program
1. Remove all media such as Memory Card, cd, dvd, and USB devices. Then, restart the computer and please do the following:
Boot in Safe Mode on Windows XP, Windows Vista, and Windows 7 system
a) Before Windows begins to load, press F8 on your keyboard.
b) It will display the Advanced Boot Options menu. Select Safe Mode.
Start computer in Safe Mode using Windows 8 and Windows 10
a) Close any running programs on your computer.
b) Get ready to Start Windows. On your keyboard, Press and Hold Shift key and then, click on Restart button.
c) It will prompt you with options, please click on Troubleshoot icon.
d) Under Troubleshoot window, select Advanced Options.
e) On next window, click on Startup Settings icon.
f) Lastly, click on Restart button on subsequent window.
g) When Windows restarts, present startup options with numbers 1 - 9. Select "Enable Safe Mode with Networking" or number 5.
h) Windows will now boot on Safe Mode with Networking. Proceed with virus scan as the next step.
2. Once Windows is running under Safe Mode with Networking, open your antivirus program and download the most recent update. This method ensures that your antivirus program can detect even newer variants of Trojan.Mebroot.
Updating your antivirus software is a one-click process. Please refer to your software manual for complete instructions.
3. Once updating is finished, run a full system scan on the affected PC. After the scan, delete all infected items. If unable to clean or delete, better place the threat in quarantine.
Step 2: Run another test with online virus scanner
Another way to remove Trojan.Mebroot without the need to install additional antivirus software is to perform a thorough scan with free online virus scanner. It can be found on websites of legitimate antivirus and security provider.
1. Click the button below to proceed to the list of suggested Online Virus Scanner. Choose your desired provider. You can run each scan individually, one at a time, to ensure that all threats will be removed from the computer. This may require plug-ins, add-on or Activex object, please install if you want to proceed with scan.
2. After completing the necessary download, your system is now ready to scan and remove Trojan.Mebroot and other kinds of threats.
3. Select an option in which you can thoroughly scan the computer to make sure that it will find and delete entirely all infections not detected on previous scan.
4. Remove or delete all detected items.
5. When scanning is finished, you may now restart the computer in normal mode.
Alternative Removal Procedures for Trojan.Mebroot
Option 1 : Use Windows System Restore to return Windows to previous state
During an infection, Trojan.Mebroot drops various files and registry entries. The threat intentionally hides system files by setting options in the registry. With these rigid changes, the best solution is to return Windows to previous working state is through System Restore.
To verify if System Restore is active on your computer, please follow the instructions below to access this feature.
Access System Restore on Windows XP, Windows Vista, and Windows 7
a) Go to Start Menu, then under 'Run' or 'Search Program and Files' field, type rstrui.
b) Then, press Enter on the keyboard to open System Restore Settings.
Open System Restore on Windows 8
a) Hover your mouse cursor to the lower left corner of the screen and wait for the Start icon to appear.
b) Right-click on the icon and select Run from the list. This will open a Run dialog box.
c) Type rstrui on the 'Open' field and click on OK to initiate the command.
If previous restore point is saved, you may proceed with Windows System Restore. Click here to see the full procedure.
Ways to Prevent Trojan.Mebroot Infection
Take the following steps to protect the computer from threats. Suggested tools and security setup within installed software helps prevent the same attack on your PC.
Install an effective anti-malware program
Your first line of defense would be an effective security program that provides real-time protection. We have a list of anti-malware program that are tried and tested. It does not only scan files but also monitors your Internet traffic and is extremely active on blocking malicious communication. Click on the button below to download our recommended anti-malware program.
Always update your installed software
Software vendors constantly releases updates for programs whenever a flaw is discovered. Getting the updates makes the computer more secured and help prevents Trojan, virus, malware, and Trojan.Mebroot similar attacks. If in case your program is not set for instant update, it usually offered from vendor's web site, which you can download anytime.
Maximize the security potential of your Internet browser
Each browser has their own feature where in you can adjust the security settings that fit your browsing habit. We highly encourage you to maximize the setup to tighten the security of your browser.
Apply full caution when using the Internet
Internet is full of fraud, malware, and many forms of computer threats including Trojan.Mebroot. Implement full caution with links that you may receive from emails, social networking sites, and instant messaging programs. It might lead you to malicious sites that can cause harm to your computer. Avoid strange web sites that offers free services and software downloads.