test_scratch / cti-ATT-CK-v13.1 /enterprise-attack /attack-pattern /attack-pattern--02fefddc-fb1b-423f-a76b-7552dd211d4d.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
3.46 kB
{
"type": "bundle",
"id": "bundle--b5b11e21-4c2b-49d5-9b1e-dcf18ec73555",
"spec_version": "2.0",
"objects": [
{
"x_mitre_platforms": [
"Linux",
"Windows"
],
"x_mitre_domains": [
"enterprise-attack"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"id": "attack-pattern--02fefddc-fb1b-423f-a76b-7552dd211d4d",
"type": "attack-pattern",
"created": "2017-05-31T21:30:54.661Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": true,
"external_references": [
{
"source_name": "mitre-attack",
"external_id": "T1067",
"url": "https://attack.mitre.org/techniques/T1067"
},
{
"url": "https://www.fireeye.com/content/dam/fireeye-www/regional/fr_FR/offers/pdfs/ig-mtrends-2016.pdf",
"description": "Mandiant. (2016, February). M-Trends 2016. Retrieved January 4, 2017.",
"source_name": "MTrends 2016"
},
{
"url": "http://www.symantec.com/connect/blogs/are-mbr-infections-back-fashion",
"description": "Lau, H. (2011, August 8). Are MBR Infections Back in Fashion? (Infographic). Retrieved November 13, 2014.",
"source_name": "Lau 2011"
}
],
"modified": "2020-03-20T19:53:25.628Z",
"name": "Bootkit",
"description": "A bootkit is a malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) and Volume Boot Record (VBR). (Citation: MTrends 2016)\n\nAdversaries may use bootkits to persist on systems at a layer below the operating system, which may make it difficult to perform full remediation unless an organization suspects one was used and can act accordingly.\n\n### Master Boot Record\nThe MBR is the section of disk that is first loaded after completing hardware initialization by the BIOS. It is the location of the boot loader. An adversary who has raw access to the boot drive may overwrite this area, diverting execution during startup from the normal boot loader to adversary code. (Citation: Lau 2011)\n\n### Volume Boot Record\nThe MBR passes control of the boot process to the VBR. Similar to the case of MBR, an adversary who has raw access to the boot drive may overwrite the VBR to divert execution during startup to adversary code.",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "persistence"
}
],
"x_mitre_detection": "Perform integrity checking on MBR and VBR. Take snapshots of MBR and VBR and compare against known good samples. Report changes to MBR and VBR as they occur for indicators of suspicious activity and further analysis.",
"x_mitre_version": "1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_permissions_required": [
"Administrator",
"SYSTEM"
],
"x_mitre_is_subtechnique": false
}
]
}