1) Threat Landscape, Malware Types, Lab Setup & Static Analysis Flashcards

1
Q

What are the three core categories of hackers? State the difference in motivation, and also state the target group most likely to be affected by their actions.

A
  • *Hacktivist**: Politicaly / Idealogy motivated; Big companies / Government / Big media coverage; Examples=Anonymous/LulzSec/Sony hack.
  • *Cybercriminals**: Hacks for money; Companies / Home Users; Examples=Ransomware/FakeAV/BankTrojans.
  • *Nation State**: Espionage/Sabotage/Political; Gov/Big Companies/Core Infrastructure; Examples=Stuxnet/APT attacks/Regin.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is CyberWar and what is CyberEspionage?

A

CyberWar: Attacks against core infrastructure, very short attack duration.
CyberEspionage: Uses hacking attacks to gain knowledge. Attack can take several months.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does the Future Cybercrime Landscape looks like?

A

IoT malware, Crypto malware, Mininig malware, CyberWarfare, APT attacks, Public Opinion Manipulation, DDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are DDOS attacks?

A

Distributed Denial of Service attacks. A lot of infected hosts (botnet) send request at the same time to the same target. The goal is to massivly flood the target in a way, that it can not response anymore. Service of target will be unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain Trojans

A

Malware that allows an attacker to remotely access the infected systems and/or send tasks. Trojans are normally disguised itself as a regular user program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain Backdoors

A

Is a type of malware that opens a gate for attackers to access the infected system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain RAT

A

Malware that allows an attacker to remotely access the infected systems and/or send tasks. Trojans are normally disguised itself as a regular user program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Computer Worms

A

Self-contained programs that are able to spread functional copies of itself to other computer systems across a network, normally via Email or other methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain Downloaders

A

Malware that downloads the actually payload after it gets executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain Droppers

A

Extract malware from own code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Botnets

A

Multiple infected systems that can be controlled by the bot owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain Spyware

A

Malware that collects sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain Adware

A

Makes money from serving ads. Often tracks user behaviour.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain FakeAV

A

Fake anti-virus that cleans systems for money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain Rootkits/Bootkits

A

Two types (user mode/kernel mode). Malware that hides itself from the OS. Compromisation is not clearly visible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain File Infector Virus

A

Copies malicious code into excecutable files like COM, BAT, CMD

17
Q

Explain Ransomware

A

Trojan malware that encrypts documents on the victims machine, or otherwise threatens the user in an attempt to extort money via blackmail.

18
Q

Explain Cryptojacking malware

A

Steals crypto wallets

19
Q

Explain Cryptomining malware

A

Steals CPU power to mine crypto currencies

20
Q

Explain Modular / Blended Threat

A

A mixture whereby different components of the malware fall into different categories, all working together

21
Q

What does a malware lab needs to be?

A

Easy to setup, easy to maintain, easy to restore, isolated, easy to monitor, equipped with correct analysis tools

22
Q

What are the five W’s of malware analysis?

A

WHY, WHEN, WHAT, WHO, WHERE

23
Q

Describe the main steps, in order, for extracting malware from an infected machine. For each stage simply give a 1-2 line description of what is carried out.

A
  • Run AV, Search for rootkits => GMER or Rootkit Buster
  • Run Loki for IOC
  • Run YARA
  • Look for suspicious processes
  • Look for suspicious network connections
  • Look for system startup procedures
  • Run ATTK tool
24
Q

What is Blackboxing? What W’s are covered?

A

Find as much out as possible about malware by executing the malware and run monitoring tools. WHAT, WHERE, WHEN

25
Q

What is Whiteboxing? What W’s are covered?

A

Reverse engineer code of malware. WHO, WHY

26
Q

What are the main stages of malware analysis?

A
  • 0 - Extracing malware
  • 1 - Static Analysis
  • 2 - Blackboxing
  • 3 - Internet Search
  • 4 - Whiteboxing
  • 5 - Result Presentation
27
Q

What are the five main ways to get infected?

A
  • Network,
  • email
  • IM
  • data transfer via USB
  • Internet surfing
28
Q

What are symptoms of infection?

A

Slow system, disk usage, CPU power, network activity

29
Q

What is the payload?

A

Payload is the name of the code that contains the malware.

30
Q

What is the first step before extracting malware?

A

Create an image of HDD

31
Q

What are the two key behaviours of modern malware

A

Networking, Survival of reboot