Skip to content

Latest commit

 

History

History
47 lines (37 loc) · 1.66 KB

bootkit.md

File metadata and controls

47 lines (37 loc) · 1.66 KB
ID F0013
Objective(s) Defense Evasion, Persistence
Related ATT&CK Techniques Pre-OS Boot: Bootkit (T1542.003)
Version 2.0
Created 1 August 2019
Last Modified 21 November 2022

Bootkit

The boot sectors of a hard drive are modified (e.g., Master Boot Record (MBR)). ATT&CK associates bootkits with the Persistence. See ATT&CK: Pre-OS Boot: Bootkit (T1067).

The MBC also associates the Bootkit behavior with Defense Evasion because the malware may execute before or external to the system's kernel or hypervisor (e.g., through the BIOS), making it more difficult to detect. (As of 2020, ATT&CK also associates the technique with Persistence.)

Use in Malware

Name Date Method Description
Mebromi 2011 -- An MBR bootkit and a BIOS bootkit targeting Award BIOS. [1]
TrickBot 2016 -- Can implement malicious code into firmware, allowing read, write, and/or erasure of the UEFI/BIOS firmware [2]

References

[1] https://www.webroot.com/blog/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/

[2] https://eclypsium.com/wp-content/uploads/2020/12/TrickBot-Now-Offers-TrickBoot-Persist-Brick-Profit.pdf