How to remove DTrack malware
Written by Tomas Meskauskas on (updated)
What kind of malware is DTrack?
DTrack is a piece of malware capable of logging keystrokes, capturing screenshots, collecting browsing history, stealing files, injecting additional payloads, and more. Threat actors can use to steal various sensitive information, infect computers with other malware, and for other purpose.
It is known that threat actors behind DTrack are targeting organizations in Europe and Lating America.
DTrack malware in detail
One of the DTrack's capabilities is to log keystrokes. This feature allows threat actors to capture keyboard input (to steal any data typed with the keyboard). Also, DTrack can capture screenshots, retrieve browsing history, and observe running processes, IP address, and network connection information.
Additionally, DTrack can run various commands, steal files and data, execute processes, and upload, download, start or delete files on infected computers. This malware is likely to be used to steal sensitive information (e.g., passwords, credit card details, ID card information, social security numbers, etc.).
Also, devices infected with DTrack can be infected with other malware (e.g., ransomware, cryptocurrency miners, clippers, or Trojans). Thus, it is strongly recommended to remove DTrack from compromised devices immediately.
Name | DTrack backdoor malware |
Threat Type | Information stealer, keylogger |
Detection Names | Avast (Win32:Malware-gen), Combo Cleaner (Gen:Variant.Fragtor.165398), ESET-NOD32 (Win32/NukeSped.JF), Kaspersky (HEUR:Trojan.Win32.Inject.gen), Microsoft (Trojan:Win32/Nukesped!mclg), Full List (VirusTotal) |
Symptoms | Trojans are designed to stealthily infiltrate the victim's computer and remain silent, and thus no particular symptoms are clearly visible on an infected machine |
Distribution methods | Infected email attachments, malicious online advertisements, social engineering, software 'cracks' |
Damage | Stolen passwords and banking information, additional infections, monetary loss, identity theft, data loss |
Malware Removal (Windows) | To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner. |
More about DTrack
DTrack has been observed targeting government research centers, policy institutes, IT service and telecommunication service providers, and chemical manufacturers in Brazil, Germany, India, Italy, Mexico, Saudi Arabia, Switzerland, Turkey, and the US. It is used mostly for financial gain.
More information-stealing malware examples are StrelaStealer, LODEINFO, and CovalentStealer.
How did DTrack infiltrate my computer?
It is known that DTrack is distributed via malicious executables named as files associated with legitimate executables (e.g., NvContainer.exe, which shares the same name as a legitimate Nvidia file).
Typically, cybercriminals distribute malicious files via free file hosting sites, P2P networks, deceptive (or compromised) websites, and similar channels. Another popular way to trick users into downloading and executing malicious files is to send malicious links or files via email.
In other cases, threat actors use malicious installers for pirated software, fake software updaters, malicious ads, torrent sites, and similar methods to trick users into executing malware.
How to avoid installation of malware?
Download software from legitimate sources (official websites and stores/marketplaces). Avoid using P2P networks, shady pages, third-party downloaders, and similar sources to download programs or files. Do not trust ads on suspicious websites.
Examine emails sent from unknown or suspicious addresses (especially when emails are irrelevant). Remember that links or files in such emails can be malicious. Keep the operating system and installed programs updated. If you believe that your computer is already infected, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate infiltrated malware.
Update February 10, 2023 – new variant of DTrack has been discovered. This version was found during research efforts centered on a cyber-espionage campaign that took place back in 2022, from August to November. The attacks targeted a wide variety of organizations within the medical/healthcare, energy, defense, and chemical engineering spheres, as well as a leading research university. The threat actors were able to steal over 100GB of vulnerable data during each attack. There is strong evidence linking these campaigns to Lazarus – a North Korean hacker group.
Instant automatic malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.
Quick menu:
How to remove malware manually?
Manual malware removal is a complicated task - usually it is best to allow antivirus or anti-malware programs to do this automatically. To remove this malware we recommend using Combo Cleaner Antivirus for Windows.
If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user's computer:
If you checked the list of programs running on your computer, for example, using task manager, and identified a program that looks suspicious, you should continue with these steps:
Download a program called Autoruns. This program shows auto-start applications, Registry, and file system locations:
Restart your computer into Safe Mode:
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.
Video showing how to start Windows 7 in "Safe Mode with Networking":
Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup.
Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings".
Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.
Video showing how to start Windows 8 in "Safe Mode with Networking":
Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options".
In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.
Video showing how to start Windows 10 in "Safe Mode with Networking":
Extract the downloaded archive and run the Autoruns.exe file.
In the Autoruns application, click "Options" at the top and uncheck "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure, click the "Refresh" icon.
Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.
You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files. After you locate the suspicious program you wish to remove, right click your mouse over its name and choose "Delete".
After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, be sure to remove it.
Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs.
These steps might not work with advanced malware infections. As always it is best to prevent infection than try to remove malware later. To keep your computer safe, install the latest operating system updates and use antivirus software. To be sure your computer is free of malware infections, we recommend scanning it with Combo Cleaner Antivirus for Windows.
Frequently Asked Questions (FAQ)
My computer is infected with DTrack malware, should I format my storage device to get rid of it?
No, DTrack can be removed with antivirus software or manually by following the steps in our removal guide.
What are the biggest issues that malware can cause?
It depends on the type of malware (its capabilities). Malware can be used to encrypt files, steal identities and money, hijack online accounts, inject other malware, add computers to botnets, mine cryptocurrency, and more.
What is the purpose of DTrack malware?
DTrack can upload, download, and open files, log keystrokes, capture screenshots, and gather browsing history and system information. It can be used to steal sensitive information, inject other malware, and other purposes. Typically, threat actors use malware for financial gain.
How did a malware infiltrate my computer?
In most cases, computers get infected with malware via files downloaded from untrustworthy sources, fake installers for cracked/pirated software, malicious software updaters, or emails (email letters containing malicious attachments or links). Compromised pages can be used to distribute malware too.
Will Combo Cleaner protect me from malware?
Combo Cleaner can detect and remove almost all known malware. Computers infected with high-end malware must be scanned using a full scan. Usually, high-end malware hides deep in infected systems.
▼ Show Discussion