I only had a quick look at the latest sample but here's some info.
Dropper drops and executes this very advanced batch file in order to melt.
Code: Select all@ECHO OFF
:LOOP
timeout 5
DEL /Q /F "Sample.exe"
IF EXIST "Sample.exe" GOTO LOOP
DEL /Q /F %0
EXIT
After an undefined wait period the system will be infected and rebooted.
The virtual filesystem is now stored in a file on the hard disk, is accessible from usermode (lol), and some SSDT hooks are placed to protect it (lmfao).
SSDT Hooks:
NtCreateFile
NtCreateKey
NtDeleteFile
NtEnumerateKey
NtOpenFile
NtOpenKey
NtQueryDirectoryFile
NtQueryInformationFile
NtSetInformationFile
NtShutdownSystem
(jwivs.sys)
SCSI Port IRP hooks (inline jmp):
IRP_MJ_CREATE
IRP_MJ_CLOSE
IRP_MJ_DEVICE_CONTROL
IRP_MJ_INTERNAL_DEVICE_CONTROL
IRP_MJ_POWER
IRP_MJ_SYSTEM_CONTROL
(yurip.sys)
The bot appears to check for a large array of virtual machines, reversing tools and monitoring software, then does nothing with this information.
On windows 7 x64 there are BSODs from time to time and when loading certain drivers, XP 32-Bit gets stuck in BSOD loop. Payload is some crappy logger and ammyy stealer.
This clearly isn't the work of original rovnix coder, It's now a combination of advanced and retarded malware.