Modelworks
Lifer
There is a pdf up on the fsecure blog about the tld3 malware and how it works. Someone put a lot of work into this malware. Removal software trying to scan for the malware will see nothing because the malware replaces those locations with clean data before the sector is read since it has full control over what is read by the disk. It enters the system and creates itself as a print requrest that then uses print spooler to execute itself and hooks into the disk driver at the lowest levels intercepting all calls to the drives.
http://www.f-secure.com/weblog/archives/00001976.html
Another paper published at the eset page on it, they call it the rootkit of all evil 🙂
http://www.eset.com/resources/white-papers/TDL3-Analysis.pdf
http://www.f-secure.com/weblog/archives/00001976.html
Acting in the lowest level of disk filter driver, TDL3 successfully ‘hooks’ or intercepts accesses to a list of protected sectors. The malware hooks are responsible for two things: allowing direct access to the disk for malware components; and filtering
content access to the disk by other processes thus helping the malware hide its presence on the system.
TDL3 uses two methods to intercept access. In the first method, TDL3 maintains a list of physical addresses for infected sectors, as well as a corresponding fake mapping of the original clean sectors in its memory. When any attempt is made to access the infected sectors, the malware will overwrite the (infected) data read with clean data stored in memory. This listing is primarily used to protect the infected disk filter driver from being accessed, as the malware’s own file system and the malware data stored at the end of the disk are already protected.
The second tactic is simpler, as any read/write access requests to the last disk sectors that do not come from the malware will be presented with filtered content. To filter, the read data in memory to be returned to the calling process is zero-filled thus giving back a clean memory buffer.
Another paper published at the eset page on it, they call it the rootkit of all evil 🙂
http://www.eset.com/resources/white-papers/TDL3-Analysis.pdf
Last edited: