Skip to content

Latest commit

 

History

History
48 lines (37 loc) · 1.68 KB

bootkit.md

File metadata and controls

48 lines (37 loc) · 1.68 KB
ID F0013
Objective(s) Defense Evasion, Persistence
Related ATT&CK Techniques Pre-OS Boot: Bootkit (T1542.003)
Version 2.0
Created 1 August 2019
Last Modified 12 June 2023

Bootkit

The boot sectors of a hard drive are modified (e.g., Master Boot Record (MBR)). ATT&CK associates bootkits with the Persistence. See ATT&CK: Pre-OS Boot: Bootkit (T1067).

The MBC also associates the Bootkit behavior with Defense Evasion because the malware may execute before or external to the system's kernel or hypervisor (e.g., through the BIOS), making it more difficult to detect. (As of 2020, ATT&CK also associates the technique with Persistence.)

Use in Malware

Name Date Method Description
Mebromi 2011 -- The malware is an MBR bootkit and a BIOS bootkit targeting Award BIOS. [1]
TrickBot 2016 -- The malware can implement malicious code into firmware, allowing read, write, and/or erasure of the UEFI/BIOS firmware. [2]

References

[1] https://www.webroot.com/blog/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/

[2] https://eclypsium.com/wp-content/uploads/TrickBot-Now-Offers-TrickBoot-Persist-Brick-Profit.pdf