Your browser is obsolete!

The page may not load correctly.

Free trial
Dr.Web for Android

Defend what you create

Other Resources

Close

Library
My library

+ Add to library

Contact us
24/7 Tech support

Send a message

Call us

+7 (495) 789-45-86

Forum
Profile

Back to news

Trojan.Gapz.1 infecting Windows in a new manner

November 12, 2012

The anti-virus lab of Doctor Web, — the Russian IT security vendor, — has been informed of another piece of bootkit malware that is capable of concealing itself in an infected system. This application, added into virus databases under the name Trojan.Gapz.1, employs fairly interesting mechanisms to infect user computers. One of the rootkit’s purposes in an infected PC is to create an environment for loading its core modules which feature various functions.

Trojan.Gapz.1 is capable of running under both 32-and 64-bit versions of Windows. During the infection process, the Trojan checks which version of the system is being used on the infected computer. Accordingly, the very installation procedure of this malicious program varies depending on the platform. The Trojan is also able to actively exploit the vulnerabilities of a number of system components, which allows it to execute a specially generated code—something very unusual for this class of threats.

The bootkit installer attempts to bypass the UAC (User Accounts Control), which prevents an unauthorized launch of executable files in the system through the exploitation of Windows graphics’ vulnerabilities. It is notable that similar technology (the use of a specially prepared Dexter Regular font) was applied in the once-famous Trojan.Duqu, a trojan that was thoroughly studied by experts of various anti-virus companies.

Trojan.Gapz.1 then analyzes the structure of the infected computer's hard drive, creates a special image, and writes it in the reserved sectors of the disk. After that, the Trojan modifies one field in the MBR, thus making the boot loader load and run a malicious application.

Actually, the Trojan.Gapz.1 rootkit is a core of a complex malware whose main objective is to create a suitable environment for the rest of the Trojan components to be downloaded. Once launched, Trojan.Gapz.1 loads a binary image that contains a set of several modules and a configuration data unit. These modules are blocks of a specially assembled code which, when being executed, interacts with the rootkit's own API. The features and functions of these components are still not fully understood; for example, one of the modules can connect to a remote command center and download executable files from there. Thus, Doctor Web specialists have recorded the downloading of a malicious application designed to operate with the UCash payment system.

At the moment, research of Trojan.Gapz.1 is still in progress. Special tools to cure this threat have been added to Dr.Web anti-virus products, which is why this rootkit is not a serious risk to our users.

Tell us what you think

You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments

The Russian developer of Dr.Web anti-viruses

Doctor Web has been developing anti-virus software since 1992

Dr.Web is trusted by users around the world in 200+ countries

The company has delivered an anti-virus as a service since 2007

24/7 tech support

© Doctor Web
2003 — 2017

Doctor Web is the Russian developer of Dr.Web anti-virus software. Dr.Web anti-virus software has been developed since 1992.

2-12А, 3rd street Yamskogo polya, Moscow, Russia, 125040