Cyber Security News

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign that exploits a legitimate antivirus driver to bypass system protections.

The malware, identified as “kill-floor.exe,” leverages the Avast Anti-Rootkit driver (aswArPot.sys) to gain kernel-level access, effectively neutralizing security software and taking control of infected systems.

This tactic highlights the growing trend of “Bring Your Own Vulnerable Driver” (BYOVD) attacks, where attackers weaponize trusted but flawed drivers to execute malicious activities.

Infection Chain and Exploitation

The infection begins with the malware dropping the Avast Anti-Rootkit driver in a Windows directory under the guise of a legitimate file named “ntfs.bin.”

location of Avast Anti-Rootkit driver dropped by the malware

Using the Service Control utility (sc.exe), the malware registers the driver as a service, granting it unrestricted kernel-level privileges.

This access allows it to terminate critical security processes, disable endpoint detection and response (EDR) solutions, and evade tamper protection mechanisms.

Once operational, the malware enters an infinite loop, monitoring active processes on the system.

It compares these processes against a hardcoded list of 142 security-related process names.

If a match is found, the malware interacts with the Avast driver using the DeviceIoControl API and a specific IOCTL code (0x9988c094).

This code instructs the driver to terminate targeted security processes at the kernel level, effectively dismantling system defenses.

Weaponizing Kernel Privileges

The Avast Anti-Rootkit driver, originally designed to protect systems, becomes a tool for destruction in this campaign.

By exploiting its kernel-mode capabilities, the malware overrides user-mode restrictions and performs actions such as process termination using Windows kernel functions like KeAttachProcess and ZwTerminateProcess.

This manipulation underscores the risks associated with vulnerable drivers being exploited in BYOVD attacks.

To counter such threats, organizations are advised to adopt robust BYOVD protection mechanisms.

These include deploying expert rules that detect and block vulnerable drivers based on their unique signatures or hashes.

For instance, Trellix recommends integrating specific detection rules into EDR or antivirus solutions to prevent compromised drivers like aswArPot.sys from being executed.

aswArPot.sys’ service created

Such measures can thwart attempts to establish persistence, elevate privileges, or disable security software via kernel-level exploits.

Key indicators linked to this campaign include two MD5 hashes:

  • 40439f39f0195c9c7a3b519554afd17a (kill-floor.exe)
  • a179c4093d05a3e1ee73f6ff07f994aa (ntfs.bin)

These artifacts should be monitored closely by security teams to detect potential infections.

This discovery serves as a stark reminder of how trusted components can be weaponized by adversaries, emphasizing the need for proactive defense measures against advanced threats leveraging legitimate but vulnerable software components.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

1 day ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

1 day ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

1 day ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

1 day ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

1 day ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

2 days ago