27/09/2012
16:44

FakeGdF: New virus variant, it's now stronger than ever with a rootkit inside!


TG Soft recognized a new variant or Trojan.Win32.FakeGdF, it now deceives itself as AIS (Italian internal security agency), and uses a rootkit module to hide his presence better than ever.
 TG Soft researchers recognized a new variant of Trojan.Win32.FakeGdF (ransomware), that pretends to be the italian intelligence agency "Agenzia informazioni e sicurezza interna" (AISI) and uses a rootkit module to hide and to be executed at the PC startup.

Agenzia informazioni e sicurezza interna (AISI) is an italian intelligence service that was called SISDE (Servizio per le Informazioni e la Sicurezza Democratica) before 2007.

This new variant, as the elder ones, asks for a 100€ ransom through the Ukash circuit to unlock the PC.





This new FakeGdF version, gets executed through an "injection" of the Task Manager (taskmgr.exe) Windows' process, which creates a window named: "(sopa)" (acronym for Stop Online Piracy Act ), as you can see from the picture to the left.


This malware, uses a low-level rootkit to hide and execute itself once the PC is connected to the network.

The rootkit module named BS.Gapz.A infects active partition's boot sector and create hooks to the following Major Functions of disk, NULL.SYS e KBDCLASS.SYS driver:
  • IRP_MJ_DEVICE_CONTROL linked to the lowest device associated to the disk drive (es. atapi.sys)
  • IRP_MJ_INTERNAL_DEVICE_CONTROL linked to the lowest device associated to the disk drive (es. atapi.sys)
  • IRP_MJ_DEVICE_CONTROL linked to the device associated to the driver null.sys
  • hook in kbdclass.sys
  • Creation of 2 system thread and of the mutex juceAppLock_>)!(<

Hook in ATAPI.SYS (driver del disco)

\Driver\atapi -> MajorFunction[IRP_MJ_DEVICE_CONTROL] = f7490712
f7490712 8bff             mov     edi,edi
f7490714 e9b2b44192       jmp     898abbcb
f7490719 088b48288339     or      [ebx+0x39832848],cl
f749071f 00ff             add     bh,bh
f7490721 750c             jnz     f749072f
f7490723 50               push    eax








\Driver\atapi -> MajorFunction[IRP_MJ_INTERNAL_DEVICE_CONTROL] = f748c852

f748c852 8bff             mov     edi,edi
f748c854 e972f34192       jmp     898abbcb
f748c859 8b450c           mov     eax,[ebp+0xc]
f748c85c 53               push    ebx
f748c85d 56               push    esi
f748c85e 57               push    edi

Memory address where the rootkit jumps every time requests are sent to IRP_MJ_DEVICE_CONTROL and IRP_MJ_INTERNAL_DEVICE_CONTROL:

898abbcb 55               push    ebp
898abbcc 8bec             mov     ebp,esp
898abbce 51               push    ecx
898abbcf b818c28c89       mov     eax,0x898cc218
898abbd4 8945fc           mov     [ebp-0x4],eax
898abbd7 ff750c           push    dword ptr [ebp+0xc]
898abbda 8b45fc           mov     eax,[ebp-0x4]
898abbdd ff7508           push    dword ptr [ebp+0x8]
898abbe0 8b4008           mov     eax,[eax+0x8]
898abbe3 ff501c           call    dword ptr [eax+0x1c]


Hook in NULL.SYS

Null -> MajorFunction[IRP_MJ_DEVICE_CONTROL] = f7a6e438

f7a6e438 e9b4a4d291       jmp     897988f1
f7a6e43d 6828e4a6f7       push    0xf7a6e428
f7a6e442 8d45f8           lea     eax,[ebp-0x8]
f7a6e445 50               push    eax
f7a6e446 ff1504e3a6f7     call    dword ptr [f7a6e304]
f7a6e44c 8d45f8           lea     eax,[ebp-0x8]









Hook in KBDCLASS.SYS:


892dc806 55               push    ebp
892dc807 8bec             mov     ebp,esp
892dc809 51               push    ecx
892dc80a b8d0f84689       mov     eax,0x8946f8d0
892dc80f 8945fc           mov     [ebp-0x4],eax
892dc812 8b45fc           mov     eax,[ebp-0x4]
892dc815 8b4020           mov     eax,[eax+0x20]
892dc818 83b86402000000   cmp     dword ptr [eax+0x264],0x0
892dc81f 7414             jz      063ec87d
892dc821 8b4510           mov     eax,[ebp+0x10]

Rootkit's viral body is saved between the end of the partition and the end of the disk.
BS.Gapz.A uses stealth techniques to hide itself, redirecting all read and write requests to the infected boot sector to the clean one and preventing read and write oparation on the sector where the virus' body is saved.

Analysis by Eng. Gianfranco Tonello
C.R.A.M. Centro Ricerche Anti Malware
by TG Soft


Trojan.Win32.FakeGdF related articles and news:
Il C.R.A.M. analizza il fenomeno dei Ransomware con specifico riferimento al FakeGDF su ToolNews 05/2012!!
Dopo la Guardia di Finanza, la Polizia e i Carabinieri, anche la S.I.A.E. chiede il riscatto!
Virus che si spaccia per la Bundes Polizei (Gdf tedesca) Trojan.Win32.BunPolizei.A...
Trojan.Win32.FakeGdF.A
Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”

Vir.IT eXplorer PRO is certified by the biggest international organisation: