1. Malware and IOC Flashcards

1
Q

malware

A

Software designed for some nefarious purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

polymorphic malware

A

It changes its code after each use, making each replicant different from a detection point of view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

virus

A

A piece of malicious code that replicates by attaching itself to another piece of executable code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

armored malware

A

The process of making malware more difficult to reverse engineering, such as encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

crypto-malware

A

Malware that encrypts files on a system and leaves them unusable, permanently or until some ransom paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

worm

A

Pieces of code that attempt to penetrate networks and computer systems. Once in, it will create a new copy of itself on the system. Does not rely on attachment to another piece of code or file. It can “survive” on its own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

trojan horse

A

A software that appears to do one thing (and often does), but hides some other functionality. A standalone program that must be copied and installed by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

define: rootkit

A

Malware that is designed to modify the operation of the operating system to facilitate nonstandard functionality. It can do virtually anything the OS does. It can modify the system kernel and supporting functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

describe: rootkit forms

A

It can load before the OS loads, acting as a virtualization layer. They can exist in firmware of video cards and expansion cards. They can exist as a loadable library module, changing ports of the OS from outside the kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

list: 5 types of rootkits

A
firmware
virtual
kernel
library
application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

adware

A

Software supported by advertising.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

spyware

A

Software that spies on users, recording and reporting on their activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

bot

A

A piece of software that performs some task, under the control of another program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

define: RAT

A

Remote access trojan - a toolkit that provides the capability of covert surveillance and/or the ability to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

distinction of RAT

A

Rather than being just a program, there is an operator behind it, guiding it to do more persistent damage.

They typically involve the creation of hidden file structures on a system and are vulnerable to detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

logic bomb

A

A piece of code that sits dormant for a period of time, until some event invokes a malicious payload.

17
Q

list at least 5: IOC

A

Unusual outbound network traffic
Anomalies in privileged user account activity
Geographical irregularities in network traffic
Account login red flags
Increases in database read volumes
HTML response sizes
Large numbers of requests for the same file
Mismatched port-app traffic
Encrypted traffic on plain ports
Suspicious registry or system file changes
Unusual DNS requests
Unexpected patching of system
Mobile device profile changes
Bundles of data in wrong place
Web traffic with non-human behavior
Signs of DDoS activity, even if temporary