How to collect Master Boot Record for submission to Symantec Security Response
Last Updated March 03, 2015
You have reason to suspect a Master Boot Record (MBR) threat has compromised their computer, and want to know how to collect the MBR for analysis by Symantec Security Response.
Either a Symantec tool called MBRUtil or a Microsoft tool called Sector Inspector should be able to gather the required data.
MBRUtil Originally developed by PowerQuest, Symantec's tool MBRUtil can be run to collect the MBR data for forwarding to the Security Response team. This tool has been tested on Windows XP, Windows Vista and Windows Server 2003.
1. Download the tool attached below and save it to the root of the local hard drive. Unzip the MBRUtil.zip (MD5 edf9e2839253c9387fbb3321f31a36d0) to extract the contents. The password is: symantec
2. Open a command prompt and run this command:
C:\> MBRUtil /S=MyMBR.dat
3. A file named MyMBR.dat will be created in the C:\ drive. Upload this file to our submission server, using the appropriate link based on support entitlement. (See the Connect article Symantec Insider Tip: Successful Submissions! for additional advice.)
4. Contact Symantec Technical Support for further assistance or to learn the correct submission portal. Provide Technical Support with the tracking number of the Security Response submission.
1. Download the Sector Inspector tool from Microsoft. Install the Sector Inspector software on the computer where the Master Boot Record is suspected to be infected. The default location that it installs to is: C:\Program Files\Windows Resource Kits\Tools
2. Open a command line. Navigate to the above directory. Do a DIR and verify that you scan see “secinspect.exe” in the folder.
3. Run this command line. This will just copy sector 0 (The MBR is in the first 512b) :
4. Upload this MBR (the resulting “mbrsect.dsk” file located in “C:\Program Files\Windows Resource Kits\Tools”) to our submission server, using the appropriate link based on support entitlement:
5. Contact Symantec Technical Support for further assistance or to learn the correct submission portal. Provide Technical Support with the tracking number of the Security Response submission.
NOTE: In some cases, MBR viruses can disguise the infected MBR if the virus is in memory (i.e. you booted from the infected drive) while taking this sample. The virus may intercept the disk read request and may report a normal MBR instead of the actual MBR that is in place. In these cases it is best to repeat steps 3-4 again, but after booting from a known clean source. You may need to copy the SECINSPECT.EXE to the bootable source (floppy or CD).