GravityRAT Trojan - How to Detect and Remove It from Windows

GravityRAT Trojan – How to Detect and Remove It from Windows

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

This article has been created in order to help you to learn what is the GravityRAT remote access Trojan and how to remove this malware completely from your computer plus protect your PC against future infections as well.

A new Trojan horse has been detected by security researchers. The malware’s primary purpose is to infiltrate while remaining unnoticed in victim PC’s. Named GravityRAT, the Trojan aims to control your computer from distance, something that is very similar to a remote control. Only that remote control is in the hands of the cyber-criminals. Such an infection may enable GravityRAT to do all sorts of malicious things to your PC, including stealing your data, passwords and even important files, plus the malware may also infect your PC with all sorts of other malicious applications as well. If your PC has been affected by this malicious application, you should read the following article and learn how to remove this Trojan and secure your PC.

Threat Summary

TypeRemote Access Trojan (RAT)
Short DescriptionAims to remain undetected for long periods of time on your computer after which may do what the operator wants it to do (steal data, take screenshots, etc.).
SymptomsYour computer may start to behave in a weird manner. You may notice new and strange files or processes running in the background.
Distribution MethodVia malicious e-email attachments, fake setups, web links or other objects.
Detection Tool See If Your System Has Been Affected by GravityRAT


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss GravityRAT.

GravityRAT – Distribution Methods

In order to be infect the computers of unsuspecting users, the GravityRAT may engage in multiple different infection activities, the main of which is believed to be via spam e-mail messages. Such messages often pretend to be legitimate as in the fact that they imitate big companies, like the example e-mail below, used to infect with another remote access trojan by posing as a Dropbox activation link:

In addition to via e-mail, Trojans, like GravityRAT may also come into your computer by being downloaded as files, you may have been misled to thinking are legitimate. Such files are often attachments on e-mails, like fake Invoices or other forms of documents or:

  • Fake setups of programs.
  • Fake key generators.
  • Fake software license activators.
  • Fake patches, cracks or other executable types of files.

GravityRAT – Purpose and Activity

GravityRAT is a remote access Trojan – this basically means that the threat is not the type of malware that contains one or two malicious files. GravityRAT has a lot of malicious files and folders, which are dropped by it upon infecting the victims. These files may be under different names and may exist in the most often used by malware Windows folders, such as:

After dropping it’s payload, GravityRAT may heavily modify the Windows Registry Editor, starting with attacking the Run and RunOnce registry sub-keys in order to make it’s malicious modules start automatically alongside Windows.


After doing so, GravityRAT may initiate it’s full potential. For starters, the malware may connect to a remote host from which it may download and run absolutely any type of file on your computer. This is because the GravityRAT malware obtains administrative privileges by interfering with crucial Windows components that are responsible for that.

Among the activities of GravityRAT is to search your computer for any Antivirus programs and decide what to do. If there is danger for the malware’s “cryptor” also known as obfuscation software to be detected, then the malware may take the appropriate actions.

The main purpose of GravityRAT however is to aim at the important documents of your computer, such as:

  • PDF types of files.
  • Scanned photos.
  • Scanned Microsoft Word files.
  • Microsoft Excel spreadsheets.
  • Images.
  • Other often used types of files.

The main goal of GravityRAT does not stop it from doing other information stealing and collection and also other nefarious actions on your computer, like:

  • Create copies of itself to fool you into thinking you or your antivirus software has removed the threat.
  • Steal your passwords and other important information saved on your PC.
  • Copy text from your documents.
  • Log the keystrokes you type to steal passwords and other critical data (financial information).
  • Download and install other malware on your computer.
  • Update it’s obfuscation software to remain hidden for longer periods of time.
  • Delete files and damage Windows.
  • Control the hardware of your computer. (Eject flash drives, eject CD/DVD drives, etc.)

Remove GravityRAT from Your Computer

In order to make sure that this nefarious software is completely gone from your computer, security researchers strongly advise following the manual or automatic removal instructions underneath. They are created in order to assist you based on how much experience you have in malware removal. If you lack such experience, be advised that security analysts strongly advise to download an advanced anti-malware software and remove GravityRAT automatically by scanning for all of it’s objects and changed settings and reverting them back to normal. Such tool has the capability to not only fully secure your PC after removing GravityRAT, but also make sure it’s operating system remains protected against future intrusions that might take place.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share