Some news in Bootkit family :)
News are presented here.It is a well-known Stoned, but re-hashed.
All I know this malware starts some processes with NT-AUTHORITY\SYSTEM rights. Executables are not hidden and are placed somewhere in C:\System Volume Information\. It cannot be terminated because of rights.
The malware can be removed using standard technique for removing bootkits :)
Does anyone have a dropper to perform analysis?
BTW looks like it has a website :)
News are presented here.It is a well-known Stoned, but re-hashed.
All I know this malware starts some processes with NT-AUTHORITY\SYSTEM rights. Executables are not hidden and are placed somewhere in C:\System Volume Information\. It cannot be terminated because of rights.
The malware can be removed using standard technique for removing bootkits :)
Does anyone have a dropper to perform analysis?
BTW looks like it has a website :)