We have already written in a previous blog post
about the new TDL3 rootkit able to hit 64 bit Windows operating systems. We will try to check more in depth how it is actually working.
The dropper is being dropped by usual crack and porn websites, but we soon expect to see it dropped by exploit kits too
, as happened to current TDL3 infections.
As already written in the first blog post, the dropper uses two different infection techniques. If the system is a 32 bit build of Windows, the dropper will use the common technique already used by old TDL3 rootkit, by loading its driver
API trick. After the driver is loaded, the rootkit will overwrite the master boot record with its own code.
If the system is a 64 bit build of Windows, the dropper is not able to load its own unsigned driver because of Windows security checks. The dropper needs to get its driver loaded by using the MBR trick. As said in the previous blog post, the dropper infects the drive's MBR and immediately reboot the system to get its code loaded
at the following system startup.
The dropper is using a non conventional - though well known - way to patch the drive's master boot record. It opens an handle to PhysicalDrive0
and then overwrites the MBR by using SCSI commands
. It make uses of IOCTL_SCSI_PASS_THROUGH_DIRECT
command, well documented by Microsoft in its MSDN.