Master Boot Record (MBR)
Overview
Evidence: MBR Description: Collect Master Boot Record Category: Disk Platform: Windows Short Name: mbr Is Parsed: No - Raw 512-byte boot sector Sent to Investigation Hub: Yes Collect File(s): No
Background
The Master Boot Record is the first 512 bytes of a disk and contains the partition table and boot code. The MBR is critical for system boot and can be targeted by bootkits and other low-level malware.
MBR analysis can detect bootkit infections, partition manipulation, and disk tampering.
Data Collected
Type
Boot record type
MBR
StartOffset
Starting offset in file
0
EndOffset
Ending offset in file
512
FilePath
Path to saved boot record
Disk/MBR.bin
Collection Method
This collector:
Uses driver IOCTL to read the first 512 bytes of the physical disk
Saves the raw MBR to a binary file
Records offset information
Usage
MBR analysis is critical for detecting bootkits and disk-level threats. Investigators use this data to detect bootkit infections, analyze partition table modifications, identify malicious boot code, verify boot sector integrity, and detect disk manipulation.
Known Limitations
Only captures MBR (not GPT partition tables)
Requires driver access to physical disk
Single snapshot in time
Notes
The MBR contains both the partition table (last 66 bytes) and boot code (first 446 bytes). Anomalous boot code can indicate bootkit infection. Tools like bootsect or specialized MBR analyzers can examine the structure.
Last updated
Was this helpful?