Home Malware Programs Trojans Trojan:Win32/Reveton.A

Trojan:Win32/Reveton.A

Posted: December 28, 2011

Threat Metric

Threat Level: 9/10
Infected PCs: 37
First Seen: December 28, 2011
OS(es) Affected: Windows

As a browser hijacker that's often accompanied by other types of Trojans, Trojan:Win32/Reveton.A can both control which websites you visit as well as create vulnerabilities that criminals may exploit to access your PC. Trojan:Win32/Reveton.A will launch itself without your permission and attempt to disguise part or all of its components as Windows processes and other types of friendly utilities. SpywareRemove.com malware researchers discourage any attempts to avoid Trojan:Win32/Reveton.A's browser redirects without actually removing Trojan:Win32/Reveton.A due to the possibility of these vulnerabilities, and suggest a scan with appropriate anti-malware software to find and delete Trojan:Win32/Reveton.A to put a stop to its attacks.

Why Trojan:Win32/Reveton.A Wants Control of Your Web Browser

Although Trojan:Win32/Reveton.A may also exhibit other symptoms and configure itself to make additional attacks, Trojan:Win32/Reveton.A's primary function is to grab your web browser and force it to ideal (for Trojan:Win32/Reveton.A's criminal partners) destinations. Common signs of a Trojan:Win32/Reveton.A infection can include:

  • Being redirected to hostile websites that promote phishing attacks, rogue security programs or drive-by-download attacks that install PC threats without your permission. Discrepancies between phishing sites and legitimate sites may be minor, although scamware-promoting sites are more obvious than the former due to their blatant marketing of fraudulent software.
  • Being prevented from loading PC security sites or anti-malware sites. SpywareRemove.com malware analysts note that Trojan:Win32/Reveton.A may redirect you away from such sites in an immediate fashion or display fake warning screens that incorrectly-imply that these sites are hostile.
  • Poor computer performance due to Trojan:Win32/Reveton.A using your computer's resources to conduct DDoS attacks (traffic-flooding attacks that can crash websites).

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.dll File name: file.dll
Size: 3.29 MB (3296959 bytes)
MD5: c81c11bb1c8cc9935f97b726651e6902
Detection count: 41
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: January 3, 2012
file.dll File name: file.dll
Size: 949.51 KB (949515 bytes)
MD5: 48869fa2febf72300d1dfc5aa12177e7
Detection count: 40
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: January 3, 2012
file.dll File name: file.dll
Size: 186.36 KB (186368 bytes)
MD5: 3e0d782110b4393b6cfc3ade35c437b4
Detection count: 39
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: January 3, 2012
file.dll File name: file.dll
Size: 2.14 MB (2141790 bytes)
MD5: 4162ac6d6974ea2f8ed367519dc36531
Detection count: 38
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: January 3, 2012
file.dll File name: file.dll
Size: 2.07 MB (2071551 bytes)
MD5: 7947c9756270763c0b0e7f170e9d8bb8
Detection count: 33
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: January 3, 2012
%TEMP%\.exe File name: %TEMP%\.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = '1?

One Comment

  • colby says:

    I am looking for registry modifications on reveton with the fbi warning 1 that wants you to pay 100 dollars? any tips?

Loading...