Tuesday, June 28, 2011

Don’t write it, read it instead!

The bootkit malware Trojan:Win32/Popureb.E has made some changes in its code compared to previous samples (specifically, Trojan:Win32/Popureb.B), and now it introduces a driver component to prevent the malicious MBR and other malicious data stored as disk sectors from being changed. The driver component protects the data in an unusual way – by hooking the DriverStartIo routine in a hard disk port driver (for example, atapi.sys). The following steps describe the trick:

  • It calls IoGetDeviceAttachmentBaseRef( ) to retrieve the bottom device object in the disk device stack, that is, the real physical disk device object.
  • Then it hooks the DriverStartIo routine in the found device's DRIVER_OBJECT structure (see the picture below).
BID563-001.jpg


Read more: Microsoft Malware Protection Center
QR: don-t-write-it-read-it-instead.aspx

Posted via email from Jasper-Net