IDK what deeper analysis here can be. This malware is just like Popureb - well advertised piece of sh*t. And yes, it's again perfectly suitable for scaring users in ridicuolus attempt to shake with them a little more money on their "virtual protection". Dropper uses some primitive well known trick to load driver. There are some primitive copy-pasted disk hooking (standalone driver) combined with yet again copy-pasted bios stuff (standalone driver) with 3 IOCTL's (identify AwOrd bios, dump it, flash new). Don't forget about cbrom. Downloadable payload is inaccessible now, but I think it's also pure trash. If someone have it, please attach.
In case of comparing this with first itw bootkit, well there is nothing to compare.
Bootkit has only copy-pasted eeye boot part, while this bioskit all created from different pieces of another's code.
Bootkit was enough stable and enough widely distributed, bioskit no and can't.
I can continue, but it's too boring.
Like in case of popureb - KG/AM.
Ring0 - the source of inspiration