Remove Pitou Trojan and Bootkit Completely from Your PC

A very sophisticated kernel-based Trojan and bootkit connected to it have been spotted to infect computers on a global scale. The Trojan has changed its distribution methods making them, even more, sophisticated. Its bootkit is reported to interact with BIOS’s key handler and allows it to monitor all. Researchers from F-Secure have concluded that the malware may be a part of a mysterious Spam bot by being a new variant of Srizbi, which is also a kernel spam-bot detected in 2008. However, they report that it’s code is new, and it has rootkit capabilities now.

NamePitou Trojan and bootkit
TypeTrojan and bootkit
Short DescriptionThe cyber-threat may spam and connect to remote hosts. It may also steal data and download other malicious files onto the user PC.
SymptomsUsers may witness blue screen of death, system freezes, system slowdowns, and some legitimate windows processes to take more than the usual CPU and RAM usage.
Distribution MethodVia Exploit Kits, malicious .pdf attachments and malicious links carrying drive-by downloads of exploits. Supports even the latest Windows versions.
Detection ToolDownload Malware Removal Tool, to See If Your System Has Been Affected by Pitou Trojan and bootkit
User Experience Join our forum to discuss Pitou Trojan and bootkit.

trojan-infected

Pitou – How is It Distributed

The sophisticated attack may be initiated by distributing by an exploit-creating kit which is reported to be spread via malicious web links. There were three Trojan droppers which were discovered by F-Secure researchers in their report – Gamarue, Wauchos and Onkods. And cyber-criminals may use even more downloaders.

The attacking method by this Trojan was then changed to distribute an exploit-carrying .pdf file as an e-mail attachment that has the following message:

“Please, can you let me have a payment date for the attached document.
Kind Regards
Account Administrator”

Pitou Trojan and Bootkit – How Does It Work

The bootkit of Pitiou may attach to the BIOS’s object, called “INT 13h”. This may allow it to monitor various system activities.

After doing this, the malware ma set up hooks in order to tamper with Windows’s boot sequence. After this, its bootkit, called Boot.Pitou may drop a variant of the Pitou Trojan directly into the MBR (Master Boot Record).

After being activated, the trojan may create a malicious module, imitating the legitimate process “explorer.exe”. It is reported to interact with the following legitimate Windows modules, and it may assume control over the following functions:

  • BOOTMGR
  • WINLOAD.EXE
  • NTOSKRNL.EXE

The Trojan then may connect to a third-party remote host:

  • 195.154.252.179:1839

Furthermore, it might send out spam messages from a computer that has been compromised. The spam messages may be sent out via social networks as well as other remote locations.

agtisaib(.)info
alguubub(.)mobi
coosubca(.)mobi
dueifarat(.)name
ecqevaaam(.)net
ehbooagax(.)info
hioxcaoas(.)me
igocobab(.)com
iyweialay(.)net
laagubha(.)com
neaqaaxag(.)org
oxepibib(.)net
pooexaxaq(.)org
ruideawaf(.)us
seeuvamap(.)mobi
upxoearak(.)biz
utleeawav(.)us
viurjaza(.)name
wuomoalan(.)us
yaefobab(.)info

The difference between this Spamming malware and others is that it is compatible with various Windows operating systems. Also, it is important to know that Pitou has enhanced code obfuscation techniques that aim to make its discovery and reverse engineering more difficult for a researcher, hence leave it for longer in the wild without any security gaps being found.

Remove Pitou Trojan and Bootkit

Removing this threat may take more than a simple discovery and deleting since it uses a bootkit to infiltrate the firmware of the computer. For the removal of this software, you need to download a special anti-malware software that has bootkit removal capabilities. One way too remove it automatically is to isolate it by booting into safe mode, instructions for which are outlined below.

1. Boot Your PC In Safe Mode to isolate and remove Pitou Trojan and bootkit
2. Remove Pitou Trojan and bootkit with SpyHunter Anti-Malware Tool
3. Back up your data to secure it against infections by Pitou Trojan and bootkit in the future
Optional: Using Alternative Anti-Malware Tools
NOTE! Substantial notification about the Pitou Trojan and bootkit threat: Manual removal of Pitou Trojan and bootkit requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.