A very sophisticated kernel-based Trojan and bootkit connected to it have been spotted to infect computers on a global scale. The Trojan has changed its distribution methods making them, even more, sophisticated. Its bootkit is reported to interact with BIOS’s key handler and allows it to monitor all. Researchers from F-Secure have concluded that the malware may be a part of a mysterious Spam bot by being a new variant of Srizbi, which is also a kernel spam-bot detected in 2008. However, they report that it’s code is new, and it has rootkit capabilities now.
Name | Pitou Trojan and bootkit |
Type | Trojan and bootkit |
Short Description | The cyber-threat may spam and connect to remote hosts. It may also steal data and download other malicious files onto the user PC. |
Symptoms | Users may witness blue screen of death, system freezes, system slowdowns, and some legitimate windows processes to take more than the usual CPU and RAM usage. |
Distribution Method | Via Exploit Kits, malicious .pdf attachments and malicious links carrying drive-by downloads of exploits. Supports even the latest Windows versions. |
Detection Tool | Download Malware Removal Tool, to See If Your System Has Been Affected by malware |
User Experience | Join our forum to discuss Pitou Trojan and bootkit. |
Pitou – How is It Distributed
The sophisticated attack may be initiated by distributing by an exploit-creating kit which is reported to be spread via malicious web links. There were three Trojan droppers which were discovered by F-Secure researchers in their report – Gamarue, Wauchos and Onkods. And cyber-criminals may use even more downloaders.
The attacking method by this Trojan was then changed to distribute an exploit-carrying .pdf file as an e-mail attachment that has the following message:
→ “Please, can you let me have a payment date for the attached document.
Kind Regards
Account Administrator”
Pitou Trojan and Bootkit – How Does It Work
The bootkit of Pitiou may attach to the BIOS’s object, called “INT 13h”. This may allow it to monitor various system activities.
After doing this, the malware ma set up hooks in order to tamper with Windows’s boot sequence. After this, its bootkit, called Boot.Pitou may drop a variant of the Pitou Trojan directly into the MBR (Master Boot Record).
After being activated, the trojan may create a malicious module, imitating the legitimate process “explorer.exe”. It is reported to interact with the following legitimate Windows modules, and it may assume control over the following functions:
- BOOTMGR
- WINLOAD.EXE
- NTOSKRNL.EXE
The Trojan then may connect to a third-party remote host:
- 195.154.252.179:1839
Furthermore, it might send out spam messages from a computer that has been compromised. The spam messages may be sent out via social networks as well as other remote locations.
→ agtisaib(.)info
alguubub(.)mobi
coosubca(.)mobi
dueifarat(.)name
ecqevaaam(.)net
ehbooagax(.)info
hioxcaoas(.)me
igocobab(.)com
iyweialay(.)net
laagubha(.)com
neaqaaxag(.)org
oxepibib(.)net
pooexaxaq(.)org
ruideawaf(.)us
seeuvamap(.)mobi
upxoearak(.)biz
utleeawav(.)us
viurjaza(.)name
wuomoalan(.)us
yaefobab(.)info
The difference between this Spamming malware and others is that it is compatible with various Windows operating systems. Also, it is important to know that Pitou has enhanced code obfuscation techniques that aim to make its discovery and reverse engineering more difficult for a researcher, hence leave it for longer in the wild without any security gaps being found.
Remove Pitou Trojan and Bootkit
Removing this threat may take more than a simple discovery and deleting since it uses a bootkit to infiltrate the firmware of the computer. For the removal of this software, you need to download a special anti-malware software that has bootkit removal capabilities. One way too remove it automatically is to isolate it by booting into safe mode, instructions for which are outlined below.
Preparation before removing Pitou Trojan and bootkit.
Before starting the actual removal process, we recommend that you do the following preparation steps.
- Make sure you have these instructions always open and in front of your eyes.
- Do a backup of all of your files, even if they could be damaged. You should back up your data with a cloud backup solution and insure your files against any type of loss, even from the most severe threats.
- Be patient as this could take a while.
- Scan for Malware
- Fix Registries
- Remove Virus Files
Step 1: Scan for Pitou Trojan and bootkit with SpyHunter Anti-Malware Tool
Step 2: Clean any registries, created by Pitou Trojan and bootkit on your computer.
The usually targeted registries of Windows machines are the following:
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
You can access them by opening the Windows registry editor and deleting any values, created by Pitou Trojan and bootkit there. This can happen by following the steps underneath:
Step 3: Find virus files created by Pitou Trojan and bootkit on your PC.
1.For Windows 8, 8.1 and 10.
For Newer Windows Operating Systems
1: On your keyboard press + R and write explorer.exe in the Run text box and then click on the Ok button.
2: Click on your PC from the quick access bar. This is usually an icon with a monitor and its name is either “My Computer”, “My PC” or “This PC” or whatever you have named it.
3: Navigate to the search box in the top-right of your PC's screen and type “fileextension:” and after which type the file extension. If you are looking for malicious executables, an example may be "fileextension:exe". After doing that, leave a space and type the file name you believe the malware has created. Here is how it may appear if your file has been found:
N.B. We recommend to wait for the green loading bar in the navigation box to fill up in case the PC is looking for the file and hasn't found it yet.
2.For Windows XP, Vista, and 7.
For Older Windows Operating Systems
In older Windows OS's the conventional approach should be the effective one:
1: Click on the Start Menu icon (usually on your bottom-left) and then choose the Search preference.
2: After the search window appears, choose More Advanced Options from the search assistant box. Another way is by clicking on All Files and Folders.
3: After that type the name of the file you are looking for and click on the Search button. This might take some time after which results will appear. If you have found the malicious file, you may copy or open its location by right-clicking on it.
Now you should be able to discover any file on Windows as long as it is on your hard drive and is not concealed via special software.
Pitou Trojan and bootkit FAQ
What Does Pitou Trojan and bootkit Trojan Do?
The Pitou Trojan and bootkit Trojan is a malicious computer program designed to disrupt, damage, or gain unauthorized access to a computer system. It can be used to steal sensitive data, gain control over a system, or launch other malicious activities.
Can Trojans Steal Passwords?
Yes, Trojans, like Pitou Trojan and bootkit, can steal passwords. These malicious programs are designed to gain access to a user's computer, spy on victims and steal sensitive information such as banking details and passwords.
Can Pitou Trojan and bootkit Trojan Hide Itself?
Yes, it can. A Trojan can use various techniques to mask itself, including rootkits, encryption, and obfuscation, to hide from security scanners and evade detection.
Can a Trojan be Removed by Factory Reset?
Yes, a Trojan can be removed by factory resetting your device. This is because it will restore the device to its original state, eliminating any malicious software that may have been installed. Bear in mind that there are more sophisticated Trojans that leave backdoors and reinfect even after a factory reset.
Can Pitou Trojan and bootkit Trojan Infect WiFi?
Yes, it is possible for a Trojan to infect WiFi networks. When a user connects to the infected network, the Trojan can spread to other connected devices and can access sensitive information on the network.
Can Trojans Be Deleted?
Yes, Trojans can be deleted. This is typically done by running a powerful anti-virus or anti-malware program that is designed to detect and remove malicious files. In some cases, manual deletion of the Trojan may also be necessary.
Can Trojans Steal Files?
Yes, Trojans can steal files if they are installed on a computer. This is done by allowing the malware author or user to gain access to the computer and then steal the files stored on it.
Which Anti-Malware Can Remove Trojans?
Anti-malware programs such as SpyHunter are capable of scanning for and removing Trojans from your computer. It is important to keep your anti-malware up to date and regularly scan your system for any malicious software.
Can Trojans Infect USB?
Yes, Trojans can infect USB devices. USB Trojans typically spread through malicious files downloaded from the internet or shared via email, allowing the hacker to gain access to a user's confidential data.
About the Pitou Trojan and bootkit Research
The content we publish on SensorsTechForum.com, this Pitou Trojan and bootkit how-to removal guide included, is the outcome of extensive research, hard work and our team’s devotion to help you remove the specific trojan problem.
How did we conduct the research on Pitou Trojan and bootkit?
Please note that our research is based on an independent investigation. We are in contact with independent security researchers, thanks to which we receive daily updates on the latest malware definitions, including the various types of trojans (backdoor, downloader, infostealer, ransom, etc.)
Furthermore, the research behind the Pitou Trojan and bootkit threat is backed with VirusTotal.
To better understand the threat posed by trojans, please refer to the following articles which provide knowledgeable details.