rkhunter wrote:MD5: 73B02AF92F48D4116F384BE14F227655
[1/39] Kaspersky - Backdoor.Win32.ZAccess.dzi https://www.virustotal.com/file/ce6f9fb ... /analysis/
This sample replaces the sys file "afd.sys" in the drivers folder. However, If I try to copy the afd.sys file using explorer or command prompt, It serves the clean version. Only when I copy it using GMer, I get the malicious replaced file.
I have gone through some of the analysis of the ZeroAccess and they have mentioned this functionality is achieved because the zeroaccess intercepts Windows' disk I/O by hijacking the disk.sys connection to the lower port device and If an attempt to read or write the infected driver is intercepted, the rootkit fakes the file content by showing the original clean content.
Can somebody help me how to see this block of assembly code responsible for doing the above mentioned activity.
Thanks in Advance!