Per the Cylance detailed analysis, this is one nasty bugger with rootkit, backdoor, and driver components using a stolen cert..
The most interesting thing is that even on Windows 64 bit, rootkit drivers can still be dangerous. Hacker's Door could completely bypass the firewall. Too bad that drivers can't be somehow monitored via behavior blockers, because of the way that Windows is designed.
This won't work on Win 10 due to enhanced driver signing requirements. The "new" version of the malware is still using the "old" version cert. as noted in the Cylance article: For non-Win 10 users, best strategy is find the above cert., download it to your cert. CA store, and untrust it.