The so-called platform of malefactors of Nemesis includes a set of different files and tools, including the keylogger, tools of a file transfer, capture of screenshots and management of the working processes. All these tools are used by malefactors for theft of financial information at banks and payment terminals.
Fig. Loading process of OS in the system (hijack the system boot process) compromised with BOOTRASH. The part of a malicious code of an early stage of loading is located in own file system of malicious software under the name Virtual File System (VFS) which is located behind data of volume.
For storage of the files Nemesis, BOOTRASH uses a free space between disk partitions for the organization of the file system. For the rest, the behavior of BOOTRASH a little in what differs from normal butkit about which we wrote earlier. Such important files necessary for its functioning as vbr.bin, vbs.bin, and also bootldr.sys are stored in file system of a butkit. Other performed and data files can be stored both in VFS, and as binary data in the section of the register HKCU\.Default\Identities. In the table such components are provided below.
Storage of files of a malicious application in sectors of the hard drive and the organization of own file system represents a good method of concealment of the presence both for the user's eyes, and in relation to AV scanners and security-products which specialize in the analysis of file systems. Nevertheless, the majority of such products are able to scan on presence of a malicious code both MBR, and VBR today, recovering a necessary bootstrap-code or a code of the loader in these critical sectors. Having lost the code in these important sectors, butkit loses a possibility of execution of further operations, including, activation of payload that is bad news to malefactors.
Dropper BOOTRASH has the following MD5 identifier: 372f1e4d2d5108bbffc750bb0909fc49.
This article is a translation of the original post at habrahabr.ru/post/272641/
If you have any questions regarding the material covered in the article above, please, contact the original author of the post.
If you have any complaints about this article or you want this article to be deleted, please, drop an email here: email@example.com.
We believe that the knowledge, which is available at the most popular Russian IT blog habrahabr.ru, should be accessed by everyone, even though it is poorly translated.
Shared knowledge makes the world better.