A very sophisticated kernel-based Trojan and bootkit connected to it have been spotted to infect computers on a global scale. The Trojan has changed its distribution methods making them, even more, sophisticated. Its bootkit is reported to interact with BIOS’s key handler and allows it to monitor all. Researchers from F-Secure have concluded that the malware may be a part of a mysterious Spam bot by being a new variant of Srizbi, which is also a kernel spam-bot detected in 2008. However, they report that it’s code is new, and it has rootkit capabilities now.
|Name||Pitou Trojan and bootkit|
|Type||Trojan and bootkit|
|Short Description||The cyber-threat may spam and connect to remote hosts. It may also steal data and download other malicious files onto the user PC.|
|Symptoms||Users may witness blue screen of death, system freezes, system slowdowns, and some legitimate windows processes to take more than the usual CPU and RAM usage.|
|Distribution Method||Via Exploit Kits, malicious .pdf attachments and malicious links carrying drive-by downloads of exploits. Supports even the latest Windows versions.|
|Detection Tool||Download Malware Removal Tool, to See If Your System Has Been Affected by Pitou Trojan and bootkit|
|User Experience||Join our forum to discuss Pitou Trojan and bootkit.|
Pitou – How is It Distributed
The sophisticated attack may be initiated by distributing by an exploit-creating kit which is reported to be spread via malicious web links. There were three Trojan droppers which were discovered by F-Secure researchers in their report – Gamarue, Wauchos and Onkods. And cyber-criminals may use even more downloaders.
The attacking method by this Trojan was then changed to distribute an exploit-carrying .pdf file as an e-mail attachment that has the following message:
→ “Please, can you let me have a payment date for the attached document.
Pitou Trojan and Bootkit – How Does It Work
The bootkit of Pitiou may attach to the BIOS’s object, called “INT 13h”. This may allow it to monitor various system activities.
After doing this, the malware ma set up hooks in order to tamper with Windows’s boot sequence. After this, its bootkit, called Boot.Pitou may drop a variant of the Pitou Trojan directly into the MBR (Master Boot Record).
After being activated, the trojan may create a malicious module, imitating the legitimate process “explorer.exe”. It is reported to interact with the following legitimate Windows modules, and it may assume control over the following functions:
The Trojan then may connect to a third-party remote host:
Furthermore, it might send out spam messages from a computer that has been compromised. The spam messages may be sent out via social networks as well as other remote locations.
The difference between this Spamming malware and others is that it is compatible with various Windows operating systems. Also, it is important to know that Pitou has enhanced code obfuscation techniques that aim to make its discovery and reverse engineering more difficult for a researcher, hence leave it for longer in the wild without any security gaps being found.
Remove Pitou Trojan and Bootkit
Removing this threat may take more than a simple discovery and deleting since it uses a bootkit to infiltrate the firmware of the computer. For the removal of this software, you need to download a special anti-malware software that has bootkit removal capabilities. One way too remove it automatically is to isolate it by booting into safe mode, instructions for which are outlined below.