đŸ›Ąī¸
./Malfav.asm
Linkedin
  • 👋./Malfav.asm
    • đŸ•¸ī¸Malfav Agenda
  • đŸ•ˇī¸Malware Introduction
    • 💡What is Malware
      • 🌠FIN Malware
      • đŸĻ˜Cyber Gang Malware
        • đŸ•ˇī¸Spiders Malware
      • đŸ•ĩī¸â€â™€ī¸Cyber Espionage Malware
      • 🍘Cyber Sabotage Malware
      • 🛴Rootkit
        • đŸĢšBootkit
    • đŸĻĢNations State APT
      • đŸ—¯ī¸APT
      • 🇮🇷Iran APT
      • 🇷đŸ‡ēRussian APT
      • đŸ‡¨đŸ‡ŗChines APT
      • đŸ‡ŽđŸ‡ŗIndia APT
      • đŸ‡ĩ🇰Pakistan APT
      • đŸ‡ģđŸ‡ŗVietnamese APT
      • 🇰đŸ‡ĩNorth Korean APT
    • đŸĨ‹Mobile Malware
      • 📲Android Malware
        • 💰Commerical Android Malware
          • Common Android Spyware
        • 🧧Common Android Exploits
          • 0ī¸Common Android 0day
      • 📱IPHONE Malware
        • 🐚Common IPHONE Spyware
        • đŸ’ĨCommerical IPHONE Malware
        • đŸ’ŖCommon IPHONE Exploits
    • 📃Malicious Documents
      • 📨Excel Spreadsheets
      • đŸ—ŧPowerPoint Presentations
      • đŸ¤ēMicrosoft Office Documents
      • 📑PDF
      • 📄Other Document Formats
      • đŸŠŧCommon Techniques Used in Malicious Documents
    • đŸžī¸Advanced Persistence Threat - APT
      • đŸĨ APT Groups
        • đŸ‡¨đŸ‡ŗMustang Panda
        • 🛕Mustard Tempest
        • đŸ‡¨đŸ‡ŗNaikon
        • đŸĒĄNEODYMIUM
        • 🇷đŸ‡ēNomadic Octopus
        • 🇮🇷OilRig
        • 🍊Orangeworm
        • đŸ‡ŽđŸ‡ŗPatchwork
        • đŸ‡¨đŸ‡ŗPittyTiger
        • 🌏PLATINUM
        • 🇱🇧POLONIUM
        • đŸ‡ĩ🇹Poseidon Group
        • 🇹🇲PROMETHIUM
        • đŸ‡¨đŸ‡ŗPutter Panda
        • đŸĻRancor
        • đŸ‡¨đŸ‡ŗRocke
        • đŸĸRTM
        • 🇷đŸ‡ēSandworm Team
        • 🃏Scarlet Mimic
        • đŸ‡Ŧ🇱Scattered Spider
        • đŸ‡ĩ🇰SideCopy
        • đŸ‡ŽđŸ‡ŗSidewinder
        • 🔕Silence
        • 🇮🇷Silent Librarian
        • đŸ‡ŗđŸ‡ŦSilverTerrier
        • 🐞Sowbug
        • 🔱Strider
        • đŸ‡¨đŸ‡ŗSuckfly
        • đŸĨƒTA2541
        • đŸ‡¨đŸ‡ŗTA459
        • đŸ’ŧTA505
        • 💰TA551
        • â˜ī¸TeamTNT
        • 🇷đŸ‡ēTEMP.Veles
        • đŸĻŗThe White Company
        • đŸ’ŗThreat Group-1314
        • đŸĢ“Threat Group-3390
        • đŸ‡¨đŸ‡ŗThreat Group-3390
        • đŸĻThrip
        • 🐈ToddyCat
        • 🐙Tonto Team
        • đŸ‡ĩ🇰Transparent Tribe
        • 🐠Tropic Trooper
        • đŸĸTurla
        • 🇮🇷UNC788
        • 🇱🇧Volatile Cedar
        • đŸ‡¨đŸ‡ŗVolt Typhoon
        • đŸ•Šī¸Whitefly
        • 🔘Windigo
        • đŸĒŊWindshift
        • đŸ‡¨đŸ‡ŗWinnti Group
        • đŸĨ€WIRTE
        • 🇷đŸ‡ēWizard Spider
        • đŸŽĒZIRCONIUM
      • 🏹APT's Software
        • 🐀3PARA RAT
        • 🐀4H RAT
        • âšąī¸AADInternals
        • đŸ”ģABK
        • âš—ī¸AbstractEmu
        • đŸĒąACAD/Medre.A
        • 🇲🇰AcidRain
        • đŸŦAction RAT
  • 🐁OS Internal's
    • 🍩Suspicious API's
      • đŸĒ¨Process Information API's
      • 🧩Registry API's
      • 🔒Encryption API's
      • đŸ“¯Restore Point API's
      • 👾Exfiltration API's
      • đŸĻ‰Data Wiping API's
      • 📨Shadow Copy API's
      • đŸĒŧWhat is Malicious API's Functions
      • đŸŒĒī¸System Information API's
      • 🌀Network Information API's
  • đŸĒŸWindows Internal
    • 📡Windows Internal
      • đŸĻWhy Windows Internal ?
        • đŸĩī¸Process
        • đŸ§ĩThread
        • đŸĒ­Handle
        • 🌐Memory
        • â˜ĸī¸Ram
        • 🤖ROM
  • đŸ‘ī¸â€đŸ—¨ī¸Malware Technique
    • 📓Malware Technique
    • đŸ’ĸObfuscation
      • đŸĻžAnti-Debugging Techniques
      • đŸ—ī¸Instruction Substitution
      • 📔Code Obfuscation
      • đŸ“ĻCode Packing
      • 💈Polymorphism
      • đŸŒŦī¸Control Flow Obfuscation
      • đŸĒ…Data Obfuscation
      • 💅Metadata Obfuscation
      • đŸŽŖMetamorphism
      • ⛲Runtime Obfuscation
    • 🛌Persistence Mechanism
      • 🔰Registry Persistence Mechanism
      • đŸ—‘ī¸Task Sch Persistence Mechanism
      • 📂Startup Folder
      • 🎋AppData Folder
      • đŸĒšTemp Folder
  • âš”ī¸Malware Resources
    • đŸ‘ģMalware Resources
    • 🎇Malware Sample Resources
      • đŸŒĄī¸VirusShare
      • â™ ī¸MalShare
      • đŸšĨMalwareTraffic
      • 🚏Malware Bazaar
  • Malware Analysis Toolkit
    • 🧌Windows Malware Analysis Toolkit
      • 💉Common Online Malware Analysis Toolkit
        • 💎Joe Sandbox
        • đŸŽĒVT - VirusTotal
        • đŸ‘ŊThreat.Zone
        • đŸĻHybrid Analysis
        • đŸĻ„Any.run
        • đŸĨĢFilescan
      • đŸĨStatic Analysis Tools
        • 🍡Advance Static Analysis Tool
      • 💠Dynamic Analysis Tool
        • Advance Dynamic Analysis Tool
      • đŸĨœNetwork Analysis Tool
      • đŸĨŸString Dumpers Toolkit
        • 📏Strings
        • đŸĻžFloss
    • 📱Android Malware Analysis Toolkit
      • đŸ•šī¸Static Analysis Toolkit
      • 💠Dynamic Analysis Toolkit
      • đŸĢ’Online Analysis Toolkit
    • 📱IPHONE Malware Analysis Toolkit
      • đŸĨĸStatic Analysis Toolkit
      • â™Ļī¸Dynamic Analysis Toolkit
    • đŸ’ģMAC OSX Malware Analysis Toolkit
      • đŸ“¯Static Analysis Toolkit
      • 🍭Dynamic Analysis Toolkit
      • đŸŒŦī¸Online Analysis Toolkit
  • Books and Guidelines
    • 🔋Books and Guidelines for Malware Analysis .
      • đŸ‹ī¸â€â™€ī¸Android Malware Analysis 101
      • đŸĨ–Common Anti-Forensics
      • đŸĻŖMemory Forensics GUI
      • đŸ“ŧAssembly for Malware Analyst
      • 💾Disk Image Forensics
      • ⚡Volatility Noob to Pro
  • 📋Malware Analysis Tips
    • đŸ–‡ī¸Malware Analysis Tips
      • 🏮Memory Malware Analysis
      • 🐜Technique to Investigate Process
      • đŸ’ĨProcess Lists 1
      • đŸ’ĨProcess Lists 2
      • đŸ’ĨProcess Lists 3
  • đŸ§ŊIncident Response
    • đŸŗWhat is Incident Response
      • Incident Response Tools
      • Incident Response Toolkit
  • Technical Analysis Report
    • đŸĻŽTechnical Analysis Report
      • 🧲Stuxnet Memory Analysis
  • 🚨Rootkit Removal
    • 🤖Rootkit Removal
  • đŸ—œī¸Antivirus Artifact
    • ã€Ŋī¸Antivirus Artifact
      • 🀄Antivirus Process Name
  • 🧠Malware Author Mindset
    • đŸ’ŊMalware Author Mindset
      • đŸĢHow Malware Author Terminate Antivirus Process during runtime ?
Powered by GitBook
On this page
  1. Malware Introduction
  2. What is Malware

Rootkit

A rootkit is a type of malicious software designed to gain unauthorized access to a computer system while hiding its presence from security measures and users. Rootkits can be used to maintain persistent access to a compromised system, evade detection, and perform a variety of malicious activities.

Key Characteristics of Rootkits

  1. Stealth and Concealment

    • Hides Itself: Rootkits are specifically designed to hide their presence and the presence of other malware on the system. They achieve this by modifying system processes, files, and configurations to avoid detection.

    • System Modification: Can alter system files, kernel modules, and low-level system functions to prevent security tools from detecting the rootkit and any malicious activities it performs.

  2. Types of Rootkits

    • Kernel-Level Rootkits: Operate at the kernel level of the operating system, which allows them to have high levels of control and concealment. They can intercept and modify system calls, manage drivers, and alter the kernel itself.

    • User-Level Rootkits: Operate in user space and generally have less control compared to kernel-level rootkits. They often disguise themselves as legitimate software or processes.

    • Firmware Rootkits: Reside in firmware, such as BIOS or UEFI, and can persist even after operating system reinstallation. They are difficult to detect and remove.

    • Bootkits: A subtype of rootkits that infect the boot sector of a hard drive or the master boot record (MBR). They load before the operating system and can remain hidden from many security measures.

  3. Common Functions

    • Maintaining Access: Provides attackers with continuous, stealthy access to the infected system, allowing them to execute commands, install additional malware, or exfiltrate data.

    • Data Theft: Can be used to gather sensitive information, such as passwords, financial data, or personal information.

    • System Manipulation: Enables attackers to manipulate system operations, such as hiding files, modifying system logs, or altering security settings.

  4. Detection and Prevention

    • Behavioral Analysis: Monitoring system behavior for unusual or suspicious activities that may indicate the presence of a rootkit. This includes unexpected changes in system processes, file modifications, or network traffic.

    • Rootkit Scanners: Specialized tools designed to detect and remove rootkits by scanning for hidden processes, files, and system modifications.

    • Integrity Checks: Regularly checking the integrity of critical system files and configurations to detect unauthorized changes or tampering.

    • Secure Boot: Utilizing secure boot mechanisms to ensure that only trusted and signed software is loaded during system startup, reducing the risk of bootkits and firmware rootkits.

  5. Incident Response

    • Containment: Isolating affected systems to prevent further compromise and reduce the impact of the rootkit.

    • Eradication: Removing the rootkit and any related malware. This may involve using specialized tools or, in some cases, performing a full system reinstall.

    • Recovery: Restoring systems and data from clean backups and implementing measures to prevent future infections, such as improving security practices and updating software.

Notable Examples of Rootkits

  • Stuxnet: A sophisticated rootkit used in the Stuxnet worm, which targeted industrial control systems and was notable for its ability to infect the firmware of programmable logic controllers (PLCs).

  • TDSS (Alureon): A notorious rootkit that has been used for various malicious activities, including data theft and distributing additional malware.

  • ZeroAccess: A rootkit that was used to create a botnet for distributing spam and malware and was known for its advanced hiding techniques.

PreviousCyber Sabotage MalwareNextBootkit

Last updated 10 months ago

đŸ•ˇī¸
💡
🛴
Page cover image