Step by step guide for detection and remediation for this TDL3 inspired lolkit.
Warning: this lolkit is very unstable. Expect random BSOD at any time. The descibed scenario was used against Avatar on both Windows XP and Windows 7 (Avatar also claim to have support for Windows 8 and inside driver has a specific "case" in switch for NT 6.2 BTW).
1. Identify presense of infection. Instead of using old splicing or IRP hooking this lolkit using memory hard hacks for port driver. Since authors of this crapware were really dumb they decided to mirror these changes to the disk at I/O filter level leaving port driver file at disk untoched.
We are asume atapi.sys as target. Usual atapi.sys section headers structure
Run sigverif. It will reveal atapi.sys modification as dumb lolkit wants.
Or use RKU or GMER or every other average antirootkit. They ALL will detect anomalies.
Note: you can also simple dump atapi.sys from kernel memory and look inside.
2. Download WinHex. Even trial version is enough. Run it with admin rights and open disk as physical media. Navigate to systemroot\system32\drivers and look at atapi.sys. Usual I/O will be filtered by rootkit. Copy atapi.sys somewhere and look inside. Notice mirrored from kernel memory changes -> new NONPAGE section added, injected rootkit code damaged resource directory.
3. Next go to WinHex options and turn on "Alternate disk access mode 1". Go to unallocated partition space. There you will find encrypted container serving all this "undetectable" and "unremovable" lolkit.
4. Select all sectors with payload (~2 Mb) and fill it with zeroes.
5. Immediatelly reboot computer.
6. Run sigverif again. It will reveal all infected drivers. Replace them with clean copies.
Note: in case if authors will fix their pathetic BSOD-generator in next releases - you can do the same offline, there is nothing "unremovable" in this lolkit.
P.S. Additionally it can be easily detected by primitive user mode memory scanning of "svchost.exe", "csrss.exe" processes, because this lolkit maps PAGE_SIZE region with executable code inside.