IncidentResponsev2

4.06 Evaluate Host Kernel to Check for Rootkits

Task

Evaluate Host Kernel to Check for Rootkits

Conditions

Given a suspected compromised Windows desktop computer system, a local administrator account, incident response tools, and one or more Indicators of Compromise (IOCs).


Standards


End State

Rootkit-related elements are identified.


Notes

When a rootkit is suspected, there are various considerations for completing this task:


Manual Steps

For Linux

Chkrootkit

sudo apt-get install chkrootkit
chkrootkit
chkrootkit -h

Rkhunter

sudo apt-get install rkhunter
rkhunter -c
cat /var/log/rkhunter.log

For Windows

GMER

TDSSKiller

McAfee Rootkit Remover

Operator Note: These tools should be used in Safe Mode or offline when possible to avoid interference from active rootkits.


For macOS

KnockKnock (Objective-See)


Dependencies


Other Available Tools

Tool Platform Installation Usage
Chkrootkit Linux apt or source Command line scanning
Rkhunter Linux apt or source Command line rootkit checks
GMER Windows Download Hidden process and rootkit detection
TDSSKiller Windows Download Kernel rootkit detection
McAfee Rootkit Remover Windows Download Known rootkit removal tool
KnockKnock macOS Download Persistent and hidden programs inspection

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References

chkrootkit - Linux
rkhunter - Linux
GMER
Windows Defender Offline
TDSSKiller - Kaspersky
McAfee Rootkit Remover
KnockKnock (macOS)


Revision History

Date Version Description Author
2025-05-02 1.0 Corrected and expanded operator version incorporating Linux, Windows, macOS and advanced techniques Leo