The evolution of TDL: conquering x64

Jump to navigation Jump to search

(Publication) Link to the old Wiki page : [1] / Google search: [2]

The evolution of TDL: conquering x64
Malware TDL-4 (bot), TDL-3 (bot)
Botnet/malware group
Exploit kits
Distribution vector
Operation/Working group
CCProtocol HTTP, HTTPS, Kademlia P2P
Date 2011 / 2011-03-30
Editor/Conference ESET
Link Evolution of TDL.pdf (Archive copy)
Author Eugene Rodionov, Aleksandr Matrosov


It has been about two years since the Win32/Olmarik (also known as TDSS, TDL and Alureon) family of

malware programs started to evolve. The authors of the rootkit implemented one of the most sophisticated and advanced mechanisms for bypassing various protective measures and security mechanisms embedded into the operating system. The fourth version of the TDL rootkit family is the first reliable and widely spread bootkit targeting x64 operating systems such as Windows Vista and Windows 7. The active spread of TDL4 started in August 2010 and since then several versions of the malware have been released. Comparing it with its predecessors, TDL4 is not just a modification of the previous versions, but new malware. There are several parts that have been changed, but the most radical changes were made to its mechanisms for self-embedding into the system and surviving reboot. One of the most striking features of TDL4 is its ability to load its kernel-mode driver on systems with an enforced kernel-mode code signing policy (64-bit versions of Microsoft Windows Vista and 7) and perform kernel-mode hooks with kernel-mode patch protection policy enabled. This makes TDL4 a powerful weapon in the hands of cybercriminals. It is the abundance of references to TDL4 combined with an absence of a fully comprehensive source of essential TDL4 implementation detail that motivated us to start this research. In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals’ objectives. The report begins with information about the cybercrime group involved in distributing the malware. Afterwards we go deeper into the technical details of the bootkit implementation.


   editor = {ESET},
   author = {Eugene Rodionov, Aleksandr Matrosov},
   title = {The evolution of TDL: conquering x64},
   date = {30},
   month = Mar,
   year = {2011},
   howpublished = {\url{}},