MBAR has the ability to target rootkits that belong to the following families or that use the following rootkit technologies:
Kernel mode drivers hiding themselves, like TDL1, TDL2/TDSS, MaxSS, Srizbi, Necurs, Cutwail, etc.
Kernel mode driver patchers/infectors, embedding malicious code into core files of an Operating System, such as TDL3, ZeroAccess, Rloader, etc.
Master Boot Record infectors such as TDL4, Mebroot/Sinowal,
MoastBoot, Yurn, Pihar, etc.
Volume Boot Record/OS Bootstrap infectors like Cidox
Disk Partition table infectors like SST/Alureon
User mode patchers/infectors like ZeroAccess.
Full guide by Lawrence Abrams can be found here:
https://www.bleepingcomputer.com/virus-removal/how-to-use-malwarebytes-anti-rootkit