Quantcast
Channel: A blog about rootkits research and the Windows kernel
Viewing all articles
Browse latest Browse all 58

Windows Bootkits Guide

$
0
0
There are two main sections in the article, an infographic and web links to researches, samples and sources. The Year column indicates the year of the malware's appearance or when the information became public, Infection refers to the disk entity to be infected (Master Boot Record, UEFI, Volume Boot Record), the detection names of three security vendors and the purpose of the payload.
✨eEye BootRoot

eEye BootRoot: A Basis for Bootstrap-Based Windows Kernel Code
https://www.blackhat.com/presentations/bh-usa-05/bh-us-05-soeder.pdf

Stealth MBR rootkit
http://www2.gmer.net/mbr/

✨Vboot Kit

https://www.blackhat.com/presentations/bh-europe-07/Kumar/Presentation/bh-eu-07-kumar-apr19.pdf

✨Mebroot (Sinowal, Maosboot)

Your computer is now stoned (...again!)
https://archive.f-secure.com/weblog/archives/Kasslin-Florio-VB2008.pdf

From Gromozon to Mebroot - A Reflection on Rootkits Today
https://web.archive.org/web/20131026083019/http:/www.prevx.com/blog/119/From-Gromozon-to-Mebroot--A-Reflection-on-Rootkits-Today.html

Post mortem report on the sinowal/nu_nl incident
https://blog.fox-it.com/2012/03/16/post-mortem-report-on-the-sinowallnu-nl-incident/

Sinowal: MBR rootkit never dies!
https://web.archive.org/web/20130705231427/http://www.saferbytes.it/2012/06/06/sinowal-mbr-rootkit-never-dies-and-it-always-brings-some-new-clever-features/

MBR Rootkit, A New Breed of Malware
https://archive.f-secure.com/weblog/archives/00001393

Bootkit: the challenge of 2008
https://securelist.com/bootkit-the-challenge-of-2008/36235/

A thread on km + samples
https://www.kernelmode.info/forum/viewtopicfa5a.html?f=16&t=543

✨Stoned Bootkit

https://www.blackhat.com/presentations/bh-usa-09/KLEISSNER/BHUSA09-Kleissner-StonedBootkit-SLIDES.pdf

Sources
https://github.com/zhuyue1314/stoned-UEFI-bootkit?search=1

✨Mebratix

A thread on km + samples
https://www.kernelmode.info/forum/viewtopic51bc.html?f=16&t=151

✨MBRLock

A thread on km + samples
https://www.kernelmode.info/forum/viewtopic227f.html?f=16&t=507

✨TDL 4 (Tdss, Alureon.DX, Olmarik)

Alureon: The First In The Wild 64-Bit Windows Rootkit
https://www.virusbulletin.com/uploads/pdf/conference_slides/2010/Johnson-VB2010.pdf

TDSS. TDL-4
https://securelist.com/tdss-tdl-4/36339/

TDL4 rebooted
https://www.welivesecurity.com/2011/10/18/tdl4-rebooted/

TDL4 reloaded: Purple Haze all in my brain
https://www.welivesecurity.com/2012/02/02/tdl4-reloaded-purple-haze-all-in-my-brain/

The Evolution of TDL: Conquering x64
https://web-assets.esetstatic.com/wls/200x/white-papers/The_Evolution_of_TDL.pdf

Defeating x64: The Evolution of the TDL Rootkit
https://www.slideshare.net/matrosov/defeating-x64-the-evolution-of-the-tdl-rootkit

Tidserv 64-bit Goes Into Hiding
https://web.archive.org/web/20231210203758/https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=cbf67446-35cc-4957-b42b-0a8299d487af&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments

Backdoor.Tidserv and x64
https://web.archive.org/web/20130519145126/http://www.symantec.com/connect/blogs/backdoortidserv-and-x64

A thread on km + samples
https://www.kernelmode.info/forum/viewtopicf210.html?f=16&t=19

✨MaxSS – TDL clone (Tdss, SST, Olmasco, Alureon.FE)

Olmasco bootkit: next circle of TDL4 evolution (or not?)
https://www.welivesecurity.com/2012/10/18/olmasco-bootkit-next-circle-of-tdl4-evolution-or-not-2/

TDSS Bootkit Spawns Clones
https://www.bitdefender.com/blog/labs/tdss-bootkit-spawns-clones/

A thread on km + samples
https://www.kernelmode.info/forum/viewtopicf0b4.html?f=16&t=596

✨PiXiEServ bootkit

https://j00ru.vexillium.org/2011/10/pixieserv-out-for-public/

https://www.kernelmode.info/forum/viewtopic3de0.html?f=11&t=2505

✨Mebromi (Bioskit, Wador)

Mebromi: the first BIOS rootkit in the wild
https://www.webroot.com/blog/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/

A thread on km + samples
https://www.kernelmode.info/forum/viewtopic1321.html?f=16&t=1125

✨Smitnyl

Analysis of MBR File System Infector
https://archive.f-secure.com/weblog/archives/00002101

A thread on km forum + samples
https://www.kernelmode.info/forum/viewtopicd975.html?f=16&t=750

Analysis of Smitnyl.A, the first hybrid bootkit and file infection
https://web.archive.org/web/20231003142928/https://sudonull.com/post/163414-Analysis-of-SmitnylA-the-first-hybrid-bootkit-and-file-infection

✨Popureb

MBR Confusion
https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=7ebff36a-0740-415b-b820-f6e48b6af1e1&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments

Don’t write it, read it instead!
https://www.techkings.org/threads/more-on-trojan-win32-popureb-dont-write-it-read-it-instead.26424/

Removing Popureb Doesn’t Require a Windows Reinstall
https://www.webroot.com/blog/2011/06/30/removing-popureb-doesnt-require-a-windows-reinstall/

POPUREB: Launchpad for Future Threats
https://www.trendmicro.com/vinfo/ae/threat-encyclopedia/web-attack/107/popureb-launchpad-for-future-threats

A thread on km + samples
https://www.kernelmode.info/forum/viewtopic75e3.html?f=16&t=968&start=0

✨Rovnix (Mayachok, Cidox, BKLoader)

Rovnix.D: the code injection story
https://www.welivesecurity.com/2012/07/27/rovnix-d-the-code-injection-story/

Rovnix bootkit framework updated
https://www.welivesecurity.com/2012/07/13/rovnix-bootkit-framework-updated/

Rovnix Reloaded: new step of evolution
https://www.welivesecurity.com/2012/02/22/rovnix-reloaded-new-step-of-evolution/

Cybercriminals switch from MBR to NTFS
https://securelist.com/cybercriminals-switch-from-mbr-to-ntfs/29117/

Hasta La Vista, Bootkit: Exploiting the VBR
https://www.welivesecurity.com/2011/08/23/hasta-la-vista-bootkit-exploiting-the-vbr/

Mayachok Hooks INT8 to Dodge Emulators
https://www.bitdefender.co.uk/blog/labs/mayachok-hooks-int8-to-dodge-emulators/

The evolution of Rovnix: Private TCP/IP stacks
https://blogs.iis.net/windowsserver/the-evolution-of-rovnix-private-tcp-ip-stacks

Cidox Trojan Spoofs HTTP Host Header to Avoid Detection
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/cidox-trojan-spoofs-http-host-header-to-avoid-detection/

Rovnix new evolution
https://www.malwaretech.com/2014/05/rovnix-new-evolution.html

A thread on km + samples
https://www.kernelmode.info/forum/viewtopic5a58.html?f=16&t=981

✨Carberp

Evolution of Win32Carberp: going deeper
https://www.welivesecurity.com/2011/11/21/evolution-of-win32carberp-going-deeper/

Carberp Evolution and BlackHole: Investigation Beyond the Event Horizon
https://web-assets.esetstatic.com/wls/200x/Carberp-Evolution-and-BlackHole-public.pdf

Sources
https://github.com/hryuk/Carberp/tree/master/source%20-%20absource/pro/all%20source/bootkit

A thread on km + samples
https://www.kernelmode.info/forum/viewtopicf82b.html?p=10206#p10206

✨XPAJ

XPAJ: Reversing a Windows x64 Bootkit
https://securelist.com/xpaj-reversing-a-windows-x64-bootkit/36563/

Xpaj - the bootkit edition
https://www.bitdefender.co.uk/blog/labs/xpaj-the-bootkit-edition/

A thread on km + samples
https://www.kernelmode.info/forum/viewtopic5ef8.html?f=21&t=2059

✨Yurn

Yurn trojan adds bootkit functionality
https://www.bitdefender.co.uk/blog/labs/yurn-trojan-adds-bootkit-functionality/

A thread on km
https://www.kernelmode.info/forum/viewtopic7df6.html?f=16&t=2083

✨Gapz

Trojan.Gapz.1 infecting Windows in a new manner
https://news.drweb.com/show/?i=2979&c=5&lng=en&p=0

Win32/Gapz: New Bootkit Technique
https://www.welivesecurity.com/2012/12/27/win32gapz-new-bootkit-technique/

Win32/Gapz: steps of evolution
https://www.welivesecurity.com/2012/12/27/win32gapz-steps-of-evolution/

Win32/Gapz family ring0 payload
https://inresearching.blogspot.com/2013/03/win32gapz-family-ring0-payload.html

A thread on km + samples
https://www.kernelmode.info/forum/viewtopicbc00.html?f=16&t=2306

✨Guntior

Guntior - the story of an advanced bootkit that doesn't rely on Windows disk drivers
https://www.linkedin.com/pulse/guntior-story-advanced-bootkit-doesnt-rely-windows-disk-baranov-wue8e

Guntior Bootkit upgraded
https://zerosecurity.org/2013/06/guntior-bootkit-upgraded/

✨Whistler Bootkit

Whistler Bootkit Flies Under the Radar
https://www.bitdefender.co.uk/blog/labs/whistler-bootkit-flies-under-the-radar/

A thread on km + samples
https://www.kernelmode.info/forum/viewtopicfa77.html?f=16&t=2473

✨Halcbot

Bootkit that steals online game users’ account information
http://asec.ahnlab.com/328

Detailed analysis of Halcbot bootkit tampering with MBR
http://asec.ahnlab.com/5

A thread on km + samples
https://www.kernelmode.info/forum/viewtopicfa67.html?f=16&t=2514

✨Caphaw

Caphaw attacking major European banks using webinject plugin
https://www.welivesecurity.com/2013/02/25/caphaw-attacking-major-european-banks-with-webinject-plugin/

A thread on km + samples
https://www.kernelmode.info/forum/viewtopic3208.html?p=18527#p18527

✨Plite (PBBot, Gpb)

Plite Bootkit Spies on Gamers
https://www.bitdefender.co.uk/blog/labs/plite-rootkit-spies-on-gamers/

Trojan.GBPBoot.1 MBR infector
https://news.drweb.ru/show/?lng=ru&i=2927&c=9

A thread on km + samples
https://www.kernelmode.info/forum/viewtopic0fe5.html?f=16&t=1666

✨Simda

WinNT/Simda
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=WinNT/Simda&threatId=

Win32/Simda family ring0 payload
https://inresearching.blogspot.com/2013/07/win32simda-family-ring0-payload.html

A thread on km + samples
https://www.kernelmode.info/forum/viewtopice0b7.html?p=19755#p19755

✨Gootkit

BackDoor.Gootkit.112
https://vms.drweb.com/virus/?i=3771317

A thread on km + samples
https://www.kernelmode.info/forum/viewtopicabb9.html?f=16&t=3242

✨Sednit

En Route with Sednit: A Mysterious Downloader
https://web-assets.esetstatic.com/wls/2016/10/eset-sednit-part3.pdf

✨Pitou (Backboot)

Bootkits are not dead. Pitou is back!
https://www.tgsoft.it/news/news_archivio.asp?id=884

A thread on km + samples
https://www.kernelmode.info/forum/viewtopic0dc7.html?f=16&t=3667

✨Hacking Team Vector EDK

https://github.com/hackedteam/vector-edk

✨LoJax

LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group
https://www.welivesecurity.com/2018/09/27/lojax-first-uefi-rootkit-found-wild-courtesy-sednit-group/

✨EfiGuard UEFI bootkit

https://github.com/Mattiwatti/EfiGuard

✨MosaicRegressor

MosaicRegressor: Lurking in the Shadows of UEFI
https://securelist.com/mosaicregressor/98849/

https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/10/07080558/MosaicRegressor_Technical-details.pdf

✨FinSpy (Finfisher)

FinSpy: unseen findings
https://securelist.com/finspy-unseen-findings/104322/

✨ESPecter

UEFI threats moving to the ESP: Introducing ESPecter bootkit
https://www.welivesecurity.com/2021/10/05/uefi-threats-moving-esp-introducing-especter-bootkit/

✨MoonBounce

MoonBounce: the dark side of UEFI firmware
https://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468/

A deeper UEFI dive into MoonBounce
https://www.binarly.io/blog/a-deeper-uefi-dive-into-moonbounce

✨BlackLotus

BlackLotus UEFI bootkit: Myth confirmed
https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/

BlackLotus bootkit
https://github.com/ldpreload/BlackLotus

The Untold Story of the BlackLotus UEFI Bootkit
https://www.binarly.io/blog/the-untold-story-of-the-blacklotus-uefi-bootkit

Guidance for investigating attacks using CVE-2022-21894: The BlackLotus campaign
https://www.microsoft.com/en-us/security/blog/2023/04/11/guidance-for-investigating-attacks-using-cve-2022-21894-the-blacklotus-campaign/

✨Glupteba

Diving Into Glupteba's UEFI Bootkit
https://unit42.paloaltonetworks.com/glupteba-malware-uefi-bootkit/

✨Other

Modern bootkit trends: bypassing kernel-mode signing policy
https://www.virusbulletin.com/conference/vb2011/abstracts/modern-bootkit-trends-bypassing-kernel-mode-signing-policy/

Bootkits: past, present & future
https://www.virusbulletin.com/conference/vb2014/abstracts/bootkits-past-present-amp-future/

Exposing Bootkits with BIOS Emulation
https://www.blackhat.com/docs/us-14/materials/us-14-Haukli-Exposing-Bootkits-With-BIOS-Emulation-WP.pdf

Attacks before system startup
https://securelist.com/attacks-before-system-startup/63725/

UEFI Firmware Rootkits: Myths and Reality
https://www.blackhat.com/docs/asia-17/materials/asia-17-Matrosov-The-UEFI-Firmware-Rootkits-Myths-And-Reality.pdf

Detecting UEFI Bootkits in the Wild
https://blogs.vmware.com/security/2021/06/detecting-uefi-bootkits-in-the-wild-part-1.html

MosaicRegressor: Lurking in the Shadows of UEFI
https://securelist.com/mosaicregressor/98849/

Trickbot Now Offers «TrickBoot»: Persist, Brick, Profit
https://eclypsium.com/wp-content/uploads/TrickBot-Now-Offers-TrickBoot-Persist-Brick-Profit.pdf

DreamBoot UEFI bootkit
https://github.com/quarkslab/dreamboot

The Chinese bootkit
https://securelist.com/the-chinese-bootkit/29653/


Viewing all articles
Browse latest Browse all 58

Trending Articles