MBR Rootkit Anatomy

L

LabZero

Thread author
A rootkit MBR has these features:


• Obtains control in bootup before the OS is loaded

• No files: the code is hidden in some areas of the disk and can not be deleted as a normal file

• Requires no registry changes or other alterations to get auto-start: becomes part of the boot process

• It can hide by controlling only a few disk blocks


The MBR rootkit consists of 6 elements:


1. Installer

2. MBR Loader

3. Kernel patcher

4. Kernel driver loader

5. Sectors hider/protector

6. Kernel driver


1. Installer


The installer writes the kernel driver malware in the last sectors of the disk, and then change sectors


2. MBR Loader


The loader is put in the sector 0 (MBR) after the original MBR was copied to another disk sector


3. Kernel patcher


At this point the MBR rootkit creates a function to control the sectors loaded by NTLDR. Are thus modified kernel areas


At this point the rootkit carries its original function and then loads the rootkit driver.


4. Kernel Driver Loader


The rootkit reads from disk data about the rootkit driver to install. Once loaded into memory driver driver calls the entry point of the driver itself.


5. Sectors hider/protector


The rootkit is not a rootkit if it had the ability to hide the anti-virus. To do this put into practice some diversionary tactics:

When some program (probably a anti-virus) tries to read the MBR rootkit modified by the function returns the original MBR stored previously in another area

Modifies the write function to prevent MBR is deleted or overwritten


6. Driver Kernel


Finally the rootkit driver is active and takes care of networking operations management and protection of areas to hide.


I conclude by saying that, in order to hide a rootkit in MBR does have one very powerful tool difficult to detect.
 
Last edited by a moderator:
H

hjlbx

Thread author
Yeah tell me about it . I feel like a poor man begging for help all over the internet and people look at me like I have leprocy or some kind of disease. Im about ready to throw it all in the trash and go linux or chromebook sick of this stuff....especially after getting exactly just what you said on my thousand dollar samsung all in one pc. Also for one to think, I was running comodo in pro active mode, sandboxie, winpatrol , avast in hardened with virtualaztion tech, and numerous other third party tools . Just out of no where, defenseless and helpless now ,after the rootkit dug itself in on my mbr and 3rd re install of windows itself to find its drivers back on immediatly with no internet connection. ----fyi i did start thread in forum. also did command prompts and other techniques to check and verify mbr was ok with no result.

Just out of curiosity - did you look back at your Comodo logs to see when and where the rootkit was installed ? That's if it even shows up in the logs.
 

Mr.X

Level 8
Verified
Well-known
Aug 2, 2014
366
No. I this rootkit is so advanced i am critical in thinking it would even show this in some kind of anomaly. Its so advanced i am uncovering that when i fix mbr command and do a complete re install of windows after i delete any old partition data tables other than one im loading on it still surviving possibly by leaving a hook on some data in case its overwritten. Not 100% sure if thats the case but circumstantial evidence is pointing me that direction. One biggest thing i notice is its infected drivers it still has on system right after clean install and no internet connection.
Interesting with all that security stuff you had watching the gates... By any chance do you know how you got that rootkit?
 

Tony Cole

Level 27
Verified
May 11, 2014
1,639
This advanced rootkit, it seems very odd that TwinHeadedEagle was unable to find it, after all he is a malware expert and helps people who have nasty rootkit's. Em very strange, how do you know it's a rootkit, if you have 'no' proof?
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top