Home Malware Programs Rootkits Rootkit.Boot.Pihar.c

Rootkit.Boot.Pihar.c

Posted: August 6, 2012

Threat Metric

Threat Level: 1/10
Infected PCs: 68
First Seen: August 6, 2012
Last Seen: March 22, 2023
OS(es) Affected: Windows

Rootkit.Boot.Pihar.c is a dangerous Rootkit that may load during startup of Windows where it could run undetected. When loaded, Rootkit.Boot.Pihar.c could cause a system to crash or freeze occasionally. Moreover, Rootkit.Boot.Pihar.c may put stored data at risk from a connection to a remote attacker. It is important to detect and remove all instances of Rootkit.Boot.Pihar.c files from an infected PC.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%System%\drivers\[RANDOM CHARACTERS].sys File name: %System%\drivers\[RANDOM CHARACTERS].sys
File type: System file
Mime Type: unknown/sys
Group: Malware file
C:\WINDOWS\system32\[random name].dll File name: C:\WINDOWS\system32\[random name].dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%Temp%\[random] File name: %Temp%\[random]
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main “Use FormSuggest” = ‘Yes’HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "CertificateRevocation" = '0?HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnonBadCertRecving" = '0? HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop "NoChangingWallPaper" = '1?HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" = '.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;.scr;'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation" = '1?HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer "NoDesktop" = '1?HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = '1?HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "DisableTaskMgr" = '1?HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced "Hidden" = '0?HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[random].exe"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[random]"HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download "CheckExeSignatures" = 'no'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced "ShowSuperHidden" = '0?

Additional Information

The following URL's were detected:
foblue.com/?q=
Loading...