1.1 Analyze Indicators of Compromise and Determine the Type of Malware Flashcards

1
Q

What is the Malware or Malicious code ?

A

Malware or malicious code is any element of software that performs an unwanted function
from the perspective of the legitimate user or owner of a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to Recognize a Specific Type of Malware ?

A

We can Naru Narurecognise Malware in the following ways..

a. Recognize Malware from given scenario
b. List of symptoms
c. Description of infection or compromise
d. How it reaches a system
e. How it infects the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus ?

A

A computer virus is a type of malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works.Viruses can execute and replicate themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the malicious activities performed by viruse ?

A

Data deletion,
Data Corruption
Data Alteration.
DoS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Specific Virus Types.

A

Their are total 8 Types of Virus.

  1. Polymorphic viruses
  2. Macro Viruses
  3. Stealth Viruses
  4. Armored Viruses
  5. Retro Viruses
  6. Phage Viruses
  7. Companion Viruses
  8. Multipart or multipartite viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Virus Types ?

A
  1. Polymorphic viruses - Poly means multiple and morphic means form ,Polymorphic viruses have the ability to mask their own code using encryption in order to avoid detection by antivirus scanners.It change its signature.
  2. Macro Virus- Macro viruses live within documents or emails and exploit the scripting capabilities of productivity software.Nor enable macro in ms office
  3. Stealth viruses - Stealth viruses attempt to avoid detection by masking or hiding their activities.
  4. Armored Virus - Armored viruses Armored viruses are any form of malware that has been crafted to avoid
    detection and make removal dif!cult.Use cryptography to avoid detection
    5.Retroviruses Retroviruses are speci!cally targeted at antivirus systems to render them useless.
  5. Phage Viruses - Infect different parts of system.Regenerate themself by unremoved parts.
  6. Companion Virus - A companion virus borrows the root filename of a common executable and then gives itself the .com extension in an attempt to get itself launched rather than the intended application.
  7. Multipart or multipartite viruses - Multipart viruses perform multiple tasks and may infect a system in numerous ways.Combination of two three viruses types is the multipartite.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Crypto-malware ?

A

Crypto-malware is any form of malware that uses cryptography as a weapon or a defense.Crypto as a weapon is seen in malware such as ransomware, while crypto as a defense is seen in malware such as polymorphic and armored viruses.Crypto-malware seeks out the encryption keys of encrypted storage devices and then discloses those keys to a remote attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Ransomware ?

A

Ransonware is an Crypto-malware ,it encrypts

user data, in order to hinder its use while demanding payment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Worm ?

A

Worm is different from virus ,Worm is able to self replicate ,Its aim is to self replicate.It don’t require a host file or hard drive to infect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Trojan ?

A

A Trojan horse is a form of malicious software that is disguised as something useful or legitimate.common forms of Trojan horses are games and screensavers, but any software can be made into a Trojan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Rootkit ?

A

A rootkit is a special type of hacker tool that embeds itself deep within an operating system .It is a malicious code typically infects a operating system or kernel of OS,very difficult to detect ,It can do anything to system as legitimate user can do.Best practice is reinstall the os .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is keylogger ?

A

A keylogger is a form of malware that records the keystrokes typed into a system’s keyboard.A keylogger infection might exhibit sluggish keyboard response, require typing keys twice to get them to be recognized by the system, and cause overall system performance
degradation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Adware ?

A

Adware - displays pop-up advertisements to users based on their activities, URLs they have visited,
applications they have accessed, and so on. Adware is used to customize advertisements to prospective customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Spyware ?

A

Spyware is any form of malicious code that collects
activity about users without their direct knowledge or permission.The spy which website you visit ,capture keystrokes ,application you launch capture webcam or microphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Bots ?

A

Computers infected with malicious software and controlled as a group without the owners’ knowledge,Botnets can be used to perform distributed denial-of-service attack (DDoS attack),A DDoS attack occurs when a hacker has deposited remote-controlled agents, zombies, or bots onto numerous secondary
victims and then uses the deployed bots as a single entity to attack a primary target or a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is RAT ?

A

RAT stands for remote-access Trojan. when system infected by RAT than attacker can access your system anytime it wants .It is a type of backdoor hidden inside a host file that is linked to some current popular concept, such as a new movie, music album, or game. Once the victim uses or opens the host, the remote-control malware is installed on their system and a notification is sent to the attacker.

17
Q

What is Logic Bomb ?

A

A logic bomb is a form of malicious code that only be triggered on particular event. It is time based.
The triggering event can be a speci!c time and date, the launching of a speci!c program,typing in a certain keystroke combination, or the accessing of a speci!c URL (such as your online banking logon page).

18
Q

What is Backdoor ?

A

Backdoor is of two types
1. The backdoor was a special hard-coded user account, password, or command sequence that allowed anyone with knowledge of the access hook (sometimes called a maintenance hook) to enter the environment and make changes.Maintainence hooks must be removed before final launching the product.
2. The second meaning of backdoor is a hacker-installed remote-access client. These small,
maliciously purposed tools can easily be deposited on a computer through a Trojan horse, a virus, a worm, a website mobile code download,

19
Q

List types of Malwares ?

A
  1. Viruses
  2. Crypto-malware
  3. Ransomware
  4. Worm
  5. Trojan
  6. Rootkit
  7. Keylogger
  8. Adware
  9. Spyware
  10. Bots
  11. RAT
  12. Logic bomb
  13. Backdoor
20
Q

List Crypto-malwares ?

A

Polymorphic Virus
Ransonware
Armored Virus