Trojan.Mebroot

Trojan.Mebroot is one threat that uses advanced techniques to infect a computer. It requires systematic removal procedure to get rid of this Trojan.

Trojan.Mebroot is a deadly Trojan that can modify and infect Master Boot Record (MBR) of hard-drive. This Trojan can hide its presence by utilizing a complex rootkit technology. Trojan.Mebroot will infect the Master Boot Record (MBR) of the hard drive where boot-strapping of the operating system occurs. When starting the computer, infected MBR is loaded so as the Trojan that became a part of it. This method makes the harmful Trojan memory-resident. Trojan.Mebroot can now execute its own code that will load specific rootkit-driver and execute other malware that were dropped on the compromised computer.

Trojan.Mebroot may arrive on the system in a variety of ways. It primarily propagate on web sites that will take advantage of Internet browser’s vulnerability. Visiting these sites can download the Trojan without the knowledge of user. Fake multimedia web site that offers online adult movies are also responsible to broaden the infection of Trojan.Mebroot. The Trojan will disguise as a required player or decoder needed to watch movie which is actually non-operative. Additionally, Trojan.Mebroot is famously distributed as software cracks and key generators on file-sharing networks. Malicious files are deliberately uploaded by malware authors and shared as useful tool to completely run an unlicensed program.

Alias: StealthMBR, Stealth MBR rootkit

Threat Level: High

Systems Affected: Windows 9x, 2000, XP, Windows Vista/7

How to Remove Trojan.Mebroot

NOTE: We suggest that you PRINT or BOOKMARK this guide. There are steps that we may have to restart the computer in order to successfully remove the threat.

Step 1 : Scan and remove Trojan.Mebroot with this special tool

1. Temporarily Disable System Restore if your system is running on Windows Me/XP. [how to]

2. Start Windows in Safe Mode with Networking.
- From a power-off state, turn on the computer and press F8 on your keyboard repeatedly.
- Your computer will display Windows Advanced Boot Options menu. Select Safe Mode with Networking.
- Windows will boot loading only necessary drivers and system files. Expect that it will run with minimal features and low-resolution display.

SafeMode

Anti-rootkit utility called TDSSKiller is a free tool from Kasperksy that neutralizes complicated malware which effectively hides its process, folders, files and registry entries.

3. Click the button to download TDSSKiller from Kaspersky's official web site. Save the file to your desktop.

Download TDSSKiller

4. Extract the contents using archiver applications.
5. Locate and run the TDSSKiller.exe file.

6. On Object to Scan, please mark Services and drivers as well as Boot Sectors.
7. Click on Start Scan to begin scanning your system. This may take a while.
8. After the scan is finished, it will reboot the computer. Continue with the steps to further test the computer for virus infection.

Step 2 : Run a scan with your antivirus program

1. Remove all media such as floppy drive, cd, dvd, and USB devices. Then, restart the computer and please do the following:

Boot in Safe Mode with Networking on Windows XP, Windows Vista, and Windows 7 system
a) Before Windows begins to load, press F8 on your keyboard.
b) It will display the Advanced Boot Options menu. Select Safe Mode with Networking.

Start computer in Safe Mode with Networking using Windows 8
a) Before Windows begins to load, press Shift and F8 on your keyboard.
b) On Recovery interface, click on 'See advanced repair options'.
c) Next, click on Troubleshoot option.
d) Then, select Advanced options from the list.
e) Lastly, please choose Windows Startup Settings and click on Restart. When Windows restarts, you will be send to a familiar Advanced Boot Options screen.
f) Select Safe Mode with Networking from the selections menu.

SafeMode

2. Once Windows is running under Safe Mode with Networking, open your antivirus program and download the most recent update. This method ensures that your antivirus program can detect even newer variants of Trojan.Mebroot.

Updating your antivirus software is a one-click process. Please refer to your software manual for complete instructions.

3. Once updating is finished, run a full system scan on the affected PC. After the scan, delete all infected items. If unable to clean or delete, better place the threat in quarantine.

Step 3: Run another test with online virus scanner

Another way to remove Trojan.Mebroot without the need to install additional antivirus software is to perform a thorough scan with free online virus scanner. It can be found on websites of legitimate antivirus and security provider.

1. Click the button below to proceed to the list of suggested Online Virus Scanner. Choose your desired provider. You can run each scan individually, one at a time, to ensure that all threats will be removed from the computer. This may require plug-ins, add-on or Activex object, please install if you want to proceed with scan.

Online Virus Scan

2. After completing the necessary download, your system is now ready to scan and remove Trojan.Mebroot and other kinds of threats.
3. Select an option in which you can thoroughly scan the computer to make sure that it will find and delete entirely all infections not detected on previous scan.
4. Remove or delete all detected items.
5. When scanning is finished, you may now restart the computer in normal mode.

Alternative Removal Procedures for Trojan.Mebroot

Option 1 : Use Windows System Restore to return Windows to previous state

During an infection, Trojan.Mebroot drops various files and registry entries. The threat intentionally hides system files by setting options in the registry. With these rigid changes, the best solution is to return Windows to previous working state is through System Restore.

To verify if System Restore is active on your computer, please follow the instructions below to access this feature.

Access System Restore on Windows XP, Windows Vista, and Windows 7

a) Go to Start Menu, then under 'Run' or 'Search Program and Files' field, type rstrui.
b) Then, press Enter on the keyboard to open System Restore Settings.

rstrui-win7

Open System Restore on Windows 8

a) Hover your mouse cursor to the lower left corner of the screen and wait for the Start icon to appear.
b) Right-click on the icon and select Run from the list. This will open a Run dialog box.
c) Type rstrui on the 'Open' field and click on OK to initiate the command.

rstrui-win8

If previous restore point is saved, you may proceed with Windows System Restore. Click here to see the full procedure.

Ways to Prevent Trojan.Mebroot Infection

Take the following steps to protect the computer from threats. Suggested tools and security setup within installed software helps prevent the same attack on your PC.

Install an effective anti-malware program

Your first line of defense would be an effective security program that provides real-time protection. We have a list of anti-malware program that are tried and tested. It does not only scan files but also monitors your Internet traffic and is extremely active on blocking malicious communication. Click on the button below to download our recommended anti-malware program.

Get Protection Software

Always update your installed software

Software vendors constantly releases updates for programs whenever a flaw is discovered. Getting the updates makes the computer more secured and help prevents Trojan, virus, malware, and Trojan.Mebroot similar attacks. If in case your program is not set for instant update, it usually offered from vendor's web site, which you can download anytime.

Maximize the security potential of your Internet browser

Each browser has their own feature where in you can adjust the security settings that fit your browsing habit. We highly encourage you to maximize the setup to tighten the security of your browser.

Apply full caution when using the Internet

Internet is full of fraud, malware, and many forms of computer threats including Trojan.Mebroot. Implement full caution with links that you may receive from emails, social networking sites, and instant messaging programs. It might lead you to malicious sites that can cause harm to your computer. Avoid strange web sites that offers free services and software downloads.