Thursday, February 27, 2025
Homecyber securityNew Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

Published on

SIEM as a Service

Follow Us on Google News

In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign that exploits a legitimate antivirus driver to bypass system protections.

The malware, identified as “kill-floor.exe,” leverages the Avast Anti-Rootkit driver (aswArPot.sys) to gain kernel-level access, effectively neutralizing security software and taking control of infected systems.

This tactic highlights the growing trend of “Bring Your Own Vulnerable Driver” (BYOVD) attacks, where attackers weaponize trusted but flawed drivers to execute malicious activities.

Infection Chain and Exploitation

The infection begins with the malware dropping the Avast Anti-Rootkit driver in a Windows directory under the guise of a legitimate file named “ntfs.bin.”

Antivirus Driver
location of Avast Anti-Rootkit driver dropped by the malware

Using the Service Control utility (sc.exe), the malware registers the driver as a service, granting it unrestricted kernel-level privileges.

This access allows it to terminate critical security processes, disable endpoint detection and response (EDR) solutions, and evade tamper protection mechanisms.

Once operational, the malware enters an infinite loop, monitoring active processes on the system.

It compares these processes against a hardcoded list of 142 security-related process names.

If a match is found, the malware interacts with the Avast driver using the DeviceIoControl API and a specific IOCTL code (0x9988c094).

This code instructs the driver to terminate targeted security processes at the kernel level, effectively dismantling system defenses.

Weaponizing Kernel Privileges

The Avast Anti-Rootkit driver, originally designed to protect systems, becomes a tool for destruction in this campaign.

By exploiting its kernel-mode capabilities, the malware overrides user-mode restrictions and performs actions such as process termination using Windows kernel functions like KeAttachProcess and ZwTerminateProcess.

This manipulation underscores the risks associated with vulnerable drivers being exploited in BYOVD attacks.

To counter such threats, organizations are advised to adopt robust BYOVD protection mechanisms.

These include deploying expert rules that detect and block vulnerable drivers based on their unique signatures or hashes.

For instance, Trellix recommends integrating specific detection rules into EDR or antivirus solutions to prevent compromised drivers like aswArPot.sys from being executed.

Antivirus Driver
aswArPot.sys’ service created

Such measures can thwart attempts to establish persistence, elevate privileges, or disable security software via kernel-level exploits.

Key indicators linked to this campaign include two MD5 hashes:

  • 40439f39f0195c9c7a3b519554afd17a (kill-floor.exe)
  • a179c4093d05a3e1ee73f6ff07f994aa (ntfs.bin)

These artifacts should be monitored closely by security teams to detect potential infections.

This discovery serves as a stark reminder of how trusted components can be weaponized by adversaries, emphasizing the need for proactive defense measures against advanced threats leveraging legitimate but vulnerable software components.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...