Tuesday, March 25, 2025
Homecyber securityNew Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

Published on

SIEM as a Service

Follow Us on Google News

In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign that exploits a legitimate antivirus driver to bypass system protections.

The malware, identified as “kill-floor.exe,” leverages the Avast Anti-Rootkit driver (aswArPot.sys) to gain kernel-level access, effectively neutralizing security software and taking control of infected systems.

This tactic highlights the growing trend of “Bring Your Own Vulnerable Driver” (BYOVD) attacks, where attackers weaponize trusted but flawed drivers to execute malicious activities.

Infection Chain and Exploitation

The infection begins with the malware dropping the Avast Anti-Rootkit driver in a Windows directory under the guise of a legitimate file named “ntfs.bin.”

Antivirus Driver
location of Avast Anti-Rootkit driver dropped by the malware

Using the Service Control utility (sc.exe), the malware registers the driver as a service, granting it unrestricted kernel-level privileges.

This access allows it to terminate critical security processes, disable endpoint detection and response (EDR) solutions, and evade tamper protection mechanisms.

Once operational, the malware enters an infinite loop, monitoring active processes on the system.

It compares these processes against a hardcoded list of 142 security-related process names.

If a match is found, the malware interacts with the Avast driver using the DeviceIoControl API and a specific IOCTL code (0x9988c094).

This code instructs the driver to terminate targeted security processes at the kernel level, effectively dismantling system defenses.

Weaponizing Kernel Privileges

The Avast Anti-Rootkit driver, originally designed to protect systems, becomes a tool for destruction in this campaign.

By exploiting its kernel-mode capabilities, the malware overrides user-mode restrictions and performs actions such as process termination using Windows kernel functions like KeAttachProcess and ZwTerminateProcess.

This manipulation underscores the risks associated with vulnerable drivers being exploited in BYOVD attacks.

To counter such threats, organizations are advised to adopt robust BYOVD protection mechanisms.

These include deploying expert rules that detect and block vulnerable drivers based on their unique signatures or hashes.

For instance, Trellix recommends integrating specific detection rules into EDR or antivirus solutions to prevent compromised drivers like aswArPot.sys from being executed.

Antivirus Driver
aswArPot.sys’ service created

Such measures can thwart attempts to establish persistence, elevate privileges, or disable security software via kernel-level exploits.

Key indicators linked to this campaign include two MD5 hashes:

  • 40439f39f0195c9c7a3b519554afd17a (kill-floor.exe)
  • a179c4093d05a3e1ee73f6ff07f994aa (ntfs.bin)

These artifacts should be monitored closely by security teams to detect potential infections.

This discovery serves as a stark reminder of how trusted components can be weaponized by adversaries, emphasizing the need for proactive defense measures against advanced threats leveraging legitimate but vulnerable software components.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and...

Malicious AI Tools See 200% Surge as ChatGPT Jailbreaking Talks Increase by 52%

The cybersecurity landscape in 2024 witnessed a significant escalation in AI-related threats, with malicious...

Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

In 2024, the number of users affected by mobile banking malware skyrocketed to nearly...

Researchers Compare Malware Development in Rust vs C and C++

Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and...

Malicious AI Tools See 200% Surge as ChatGPT Jailbreaking Talks Increase by 52%

The cybersecurity landscape in 2024 witnessed a significant escalation in AI-related threats, with malicious...

Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

In 2024, the number of users affected by mobile banking malware skyrocketed to nearly...