1 - IOC | Malware Types Flashcards
1
Q
Where to look to determine if system is infected?
A
Memory, Registries, and Macros
2
Q
Characteristics of a Virus?
A
- Attaches itself to other code and replicates - Replicates when an infected file executes and launches. Then it attaches to other files, adds its code to the application’s code, and spreads. - Infects other machines only if a user an another machine accesses an infected object and launches the code.
3
Q
Resident Virus?
A
- Resides in memory
- Loaded each time the system starts
- Can remain active even after any host program terminates
4
Q
Non-Resident Virus
A
- Once executed, this virus looks for target locally and across the network
- Infects and exits
5
Q
Boot sector virus
A
- Placed into the first sector of the hard drive
- Loads into memory when the computer boots
6
Q
Macro virus
A
- Inserted into a Microsoft Office document
- Uses the macro language and executes when the document opens
7
Q
Program and File Infecting Virus
A
- Many common viruses are this
- Infects executable program files and becomes active in memory
- Seeks other files to infect
- Easily indentified by their binary pattern, or signature, which works like a fingerprint.
8
Q
Polymorphic Virus
A
- Can change its form or signature each time its executed to avoid detection.
- Can be hard to detect without an identifiable pattern or signature to match it.
- Usually identified by heuristics
9
Q
Heuristic Scanning
A
Examines the instructions running within a program.
10
Q
Armored Virus
A
- Has a layer of protection that it can use against the person who tries to analyze it; it will thwart attempts by analysts to examine its code.
- Tricks the program into thinking that it is located in a different place from where it actually resides.
11
Q
Stealth Virus
A
- Resides in memory
- Uses various techniques to go unnoticed by antivirus programs.
- Avoids detection by temporarily removing itself from an infected file or masking a file’s size.
12
Q
Multipartite Virus
A
- Infects executable files and also attacks the MBR (Master Boot Record) of the system.
- If both tbe boot sector is not cleaned along with the infected files | the files can easily be infected again.
13
Q
Characteristics of Worms
A
- Self replicating
- Doesn’t need a host file or user intervention
- Commonly spreads through email, network, and Internet
14
Q
Characteristics of Ransomware
A
- Attempts to hold a user’s information for monetary gain.
- An evolved and more demanding form of “scareware”
15
Q
Characteristics of Trojan Horses
A
- Programs disguised as useful applications
- Its capability to spread depends on the popularity of the software and a user’s willingness to download and install the software.
- Can perform actions without the user’s knowledge or consent
- Often classified by their payload or function.
- Trojans can download other Trojans
- Associated with backdoors
16
Q
RAT
A
- Remote Access Trojan
- Allow a remote attacker to take control of the targeted system.
- When executed, a remote access Trojan provides a remotely accessible backdoor for an attacker to covertly monitor the system or easily gain entry
17
Q
RootKits
A
- Piece of software than can be installed and hidden on a computer mainly to compromise the system and gain escalated privileges
- Hard to detect since it runs in the background
- Can spot it by looking for memory proccesses, monitoring outbound communications, and checking for installed programs
18
Q
Kernel Rootkits
A
- Modify the kernel component of an OS
- Can intercept system calls passed to the kernel and filter out queries that the rootkit software generates
- Can use encryption to protect outbound communications
- Often piggyback on commonly used ports to communicate without interrupting other applications.
- You can avoid rootkit by running Windows from an account with lesser privileges
19
Q
Logic Bombs
A
- Virus or Trojan horse designed to execute malicious actions when a certain event occurs or after a certain period of time.