IncidentResponsev2

4.33 Check for Rootkits

Task Check Systems for Rootkits and Hidden Malware Artifacts

Conditions

Given access to impacted systems and elevated permissions, the operator will utilize rootkit detection tools and procedures to identify hidden malware, kernel-level implants, and unauthorized hooks that could subvert eradication efforts.

Operator Note: Rootkits are designed to hide attacker presence and evade detection. Checking for rootkits is critical during eradication to ensure no hidden persistence mechanisms remain.

Standards

End State

Impacted systems have been scanned for rootkits and hidden malware. Any detections have been remediated, and the environment is validated as clean.


Notes


Manual Steps

Step 1: Select Rootkit Detection Tools

Tool Platform Installation Usage
GMER Windows Download GUI → Scan for hooks, hidden processes
Windows Defender Offline Scan Windows Built-in → Settings → Virus & Threat Protection → Offline Scan Scans outside OS environment
Rootkit Hunter (rkhunter) Linux apt install rkhunter or yum install rkhunter rkhunter --check
chkrootkit Linux apt install chkrootkit or yum install chkrootkit chkrootkit
KnockKnock macOS Install via Objective-See website GUI → View persistent items and unsigned code

Operator Note: Use multiple tools for high assurance. Rootkit detection is prone to false negatives.


Step 2: Prepare System for Scanning


Step 3: Perform Rootkit Scans

Windows (GMER)

Windows Defender Offline Scan

Linux (Rootkit Hunter)

sudo rkhunter --update
sudo rkhunter --check

Linux (chkrootkit)

sudo chkrootkit

macOS (KnockKnock)


Step 4: Review Findings


Step 5: Document Results


Running Script (Linux - Rootkit Hunter Scan and Output)

sudo rkhunter --check --report-warnings-only > rkhunter_scan_results.txt

Operator Note: Always redirect output to file for review and inclusion in incident documentation.


Dependencies


Other Available Tools

Tool Platform Installation Usage
GMER Windows Manual download GUI based, advanced rootkit scanning
Windows Defender Offline Windows Built-in Scans outside running OS
Rootkit Hunter Linux apt/yum install rkhunter Command line scan for rootkits and anomalies
chkrootkit Linux apt/yum install chkrootkit Simple command-line rootkit scanner
KnockKnock macOS Download from Objective-See GUI detection of unsigned and persistent items

Operator Note: If rootkits are detected, consider reimaging the system as part of eradication best practices.


Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References

GMER Rootkit Scanner
Rootkit Hunter (rkhunter)
chkrootkit
KnockKnock - Objective-See


Revision History

Date Version Description Author
2025-05-02 1.0 Fully generated operator guide for rootkit scanning with tools, installation, operator recommendations Leo