3 Malicious Code Flashcards

analyze indicators of malicious activity.

1
Q

9 things, B, K L R, R, S, T, V, W

What are types of Malware attack?

A
  • Bloatware
  • Keylogger
  • Logic bomb
  • Ransomware
  • Rootkit
  • Spyware
  • Trojan
  • Virus
  • Worm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ransomware - what, how to identify, how to combat

A

What - encrypts key files and holds for ransom

Identify -
Command and control (C&C) traffic and/or contact to known malicious IP addresses

Use of legitimate tools in abnormal ways to retain control of the compromised system

Lateral movement processes that seek to attack or gain information about other systems or devices inside the same trust boundaries

Encryption of files

Notices to end users of the encryption process with demands for ransom

Data exfiltration behaviors, including large file transfers

Combat -
1) Effective backup system that holds files in a separate location
2) Org decides resonse - pay or not
3) Use a pre-existing encryption tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan horses - what how to identify, how to combat

A

What - disguised as legitimate software. Relies on unsuspecting individuals running them. Examples:
* Triada Trojan, disguised as WhatsApp.
* Trojans (RATs) provide attackers with remote access to systems

Identify -
* Signatures for the specific malware applications or downloadable files

  • Command and control system hostnames and **IP addresses
    **
  • Folders or files created on target devices

Combat -
* combination of security awareness training to encourage users not to download untrusted software and
* antimalware or endpoint detection and response (EDR) tools that detect Trojan and RAT-like behavior and known malicious files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worms - what, how to identify, how to combat

A

What
Unlike Trojans that require user interaction, worms spread themselves

Identify -
Common IoCs for worms like Raspberry Robin include:

* Known malicious files
* Downloads of additional components from remote systems
* Command and control contact to remote systems
* Malicious behaviors using system commands for injection and other activities, including use of cmd.exe, msiexec.exe, and others
* Hands-on-keyboard attacker activity

Combat -
* firewalls and
* network-level controls remain one of the best ways to mitigate worm attacks.
* **Patching **and configuring services to limit attack surfaces
* After an infection - use of antimalware, EDR, and similar tools, or resetting

If compromised devices cannot communicate with other vulnerable devices, the infection can’t spread!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spyware - how to identify, how to combat

A

What - malware that is designed to obtain information about an individual, organization, or system. track users’ browsing habits, installed software, or similar information and report it back to central servers.

is associated with identity theft and fraud, advertising and redirection of traffic, digital rights management (DRM) monitoring, and with stalkerware, a type of spyware used to illicitly monitor partners in relationships.

uses techniques from other types of malware, defining software as spyware typically requires understanding its use and motivations rather than just its behavior. Thus, spyware may use Trojan, worm, or virus-style propagation methods in some cases, but the intent is to gather information about a user or system, with the methods used being less important than the goal.

Identify -
* Remote-access and remote-control-related indicators
* Known software file fingerprints
* Malicious processes, often disguised as system processes
* Injection attacks against browsers

Combat -
* using antimalware tools, although user awareness can help prevent the installation of spyware
* Mitigation practices for spyware focus on awareness, control of the software that is allowed on devices and systems, and antispyware capabilities built into antimalware tools. Since spyware is generally perceived as less of a threat than many types of malware, it is commonly categorized separately and may require specific configuration to identify and remove it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bloatware - what, how to identify, how to combat

A

What - unwanted applications installed on systems by manufacturers.

Identify -

Unlike the other malicious software categories listed in this chapter, bloatware isn’t usually intentionally malicious. It may, however, be poorly written, may call home with information about your system or usage, or may prove to be vulnerable to exploitation, adding another attack surface to otherwise secure devices. Uninstalling bloatware or using a clean operating system image are common practices for organizations as well as individuals.

Combat - it should simply be removed to prevent issues—

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Viruses - what, how to identify, how to combat

A

What - malicious programs that self-copy and self-replicate once they are activated. Unlike worms, they don’t spread themselves via vulnerable services and networks. Viruses require one or more infection mechanisms that they use to spread themselves

Identify - Viruses require one or more infection mechanisms that they use to spread themselves, like copying to a thumb drive or network share, and that mechanism is typically paired with some form of search capability to find new places to spread to once they are run.

Viruses also typically have both a trigger, which sets the conditions for when the virus will execute, and a payload, which is what the virus does, delivers, or the actions it performs.

Memory-resident viruses, which remain in memory while the system of the device is running

Non-memory-resident viruses, which execute, spread, and then shut down
**
Boot sector viruses,** which reside inside the boot sector of a drive or storage media

Macro viruses, which use macros or code inside word processing software or other tools to spread

Email viruses that spread via email either as email attachments or as part of the email itself using flaws inside email clientsFileless virus attacks are similar to traditional viruses in a number of critical ways. They spread via methods like spam email and malicious websites and exploit flaws in browser plug-ins and web browsers themselves. Once they successfully find a way into a system, they inject themselves into memory and conduct further malicious activity, including adding the ability to reinfect the system via the same process at reboot through a Registry entry or other technique. At no point do they require local file storage, as they remain memory resident throughout their entire active life—in fact, the only stored artifact of many fileless attacks would be the artifacts of their persistence techniques like Registry entry

Combat - fileless attacks require a vulnerability to succeed, so ensuring that browsers, plug-ins, and other software that might be exploited by attackers are up to date and protected can prevent most attacks.

  • awareness that helps to prevent users from clicking on and activating viruses as well as
    * antimalware tools that can detect them and prevent them both on-disk and in-memory or as they are being executed.
  • **Removal varies, with some viruses easy to remove using antimalware tools or dedicated, virus-specific utilities **while some may require more significant action. sta
  • many organizations have a standard practice of wiping the drive of an infected machine and restoring it from a known good backup or reinstalling/reimaging it. While there are some scenarios where even that won’t be enough, such as with BIOS/UEFI resident malware, in most common scenarios a complete wipe and reinstallation or reimaging will ensure the malware is gone.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Keylogger - what, how to identify, how to combat

A

What - programs that capture keystrokes from a keyboard, although keylogger applications may also capture other input such as mouse movement, touchscreen inputs, or credit card swipes from attached devices. Keyloggers work in a multitude of ways, ranging from tools that capture data from the kernel, via APIs or scripts, or even directly from memory. Regardless of how they capture data, the** goal of a keylogger is to capture user input to be analyzed and used by an attacker.**

Identify -
* File hashes and signatures
* Exfiltration activity
to command and control systems (removal of data)
* Process names
* Known reference URLs

Combat -
* patching
* systems management,
* antimalware tools.
* multifactor authentication
can help limit the impact of a keylogger, even if it cannot defeat the keylogger itself.
* bootable USB drives can prevent use of a potentially compromised underlying operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Logic bombs - what, how to identify, how to combat

A

What
* **Functions or code placed inside other programs **that will activate when set conditions are met.
* Some other types of malware may use this type of code as part of their function as well.

Identify
* Code review
* Online analysis tools like VirusTotal can be used to check whether the malware is a known tool and to see what it is identified as by multiple AV tools.

Sandbox tools can be used to analyze malware behavior in a protected environment.

Manual code analysis is common, particularly with scripts and interpreted code like Python and Perl.

Malware can be analyzed using tools like strings to look for recoverable artifacts that may be useful for the analysis

Combat
* While relatively rare compared to other types of malware, logic bombs are a consideration in software development and systems management, and can have a significant impact if they successfully activate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rootkits - what, identify, combat

A

What - allow attackers to access a system through a backdoor

**hooking filesystem drivers **to ensure that users cannot see the rootkit files to infecting startup code in the Master Boot Record (MBR) of a disk, allowing attacks against full-disk encryption systems.

Identify - test the suspected system from a trusted system or device.

Combat - rebuild the system or to restore it from a known good backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are common indicators of malicious activity associated with malware types?

A

IoCs associated with malware include:
* command and control (C&C) traffic patterns,
* IP addresses,
*** hostnames, and domains. **
* Use of system utilities in unexpected ways,
* lateral movement between systems,
* creation of files and directories,
* **encryption of files, **
* data exfiltration are also commonly seen, particularly with Trojans and rootkits.
* Signatures for malware are commonly used to identify specific files associated with given malware packages although malware writers use defensive techniques intended to make this harder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are methods to

A

Methods to mitigate malware. 
* manual removal to the
* **use of tools **to identify and remove malicious files, and often rely on
* reinstallation of a system or
* restoration from a known good backup to ensure all malware is removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Bots and Botnets, how to identify?

A

Many types of malware use command and control (C&C) techniques and systems to allow attackers to tell them what to do.
* Botnets = groups of systems that are under central command**
* Bots = individual systems**

How to identify
* know how to search for ** C&C communications **and to identify why a system reaching out to unknown hosts may be a sign of a system you’re responsible for being part of a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does IoC stand for

A

Indicators of compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does CMD.exe do

A

Cmd.exe allows access to the Microsoft Windows Command Prompt. It offers disk and file maintenance functions to your computer as well as network functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is MsiExec.exe

A

MsiExec.exe is the **executable program of the Windows Installer **used to interpret installation packages and install products on target systems. After you build your release, you can install your Windows Installer package (. msi) from the command line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Difference between spyware and bloatware

A

can be difficult to tell apart since manufacturers who install bloatware often have call-home functionality built into the bloatware.

The key differentiator is that spyware’s primary intention is to gather information about the user, their use of the system and Internet, and the configuration of the system, whereas bloatware is simply unwanted programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the difference between YARA and VirusTotal?

A

YARA was originally intended to support file-based rules.

VirusTotal’s “vt” module extended YARA’s capabilities with file’s metadata and behavior.

This allows our users to create advanced Livehunt and Retrohunt rules and get notified via IoC Stream every time new or re-scanned files match our rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the BIOS

A

BIOS **(basic input/output system) **is the program a computer’s microprocessor uses to **start the computer system **after it is powered on. It also manages data flow between the computer’s operating system (OS) and attached devices, such as the hard disk, video adapter, keyboard, mouse and printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the UEFI

A

Unified Extensible Firmware Interface (UEFI) is a specification for a software program that connects a computer’s firmware to its operating system (OS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Tools for analysing Malware in code

A

**
Online analysis tools like VirusTotal** can be used to check whether the malware is a known tool and to see what it is identified as by multiple AV tools.
**
Sandbox tools** can be used to analyze malware behavior in a protected environment.

Manual code analysis is common, particularly with scripts and interpreted code like Python and Perl.

Malware can be analyzed using tools like strings to look for recoverable artifacts that may be useful for the analysis

Many other tools and techniques are used to analyze malicious code and software, but these are a good starting point for security analysts who need to determine whether a given executable or block of code might be malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DRM system

A

Digital rights management (DRM) is the use of technology to control and manage access to copyrighted material. Another DRM meaning is taking control of digital content away from the person who possesses it and handing it to a computer program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Port 6667

A

IRC (Internet Relay Chat)

Many trojans/backdoors also use this port:Port 6667 I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the key difference between worms and viruses?

A

how they spread. Worms spread themselves, whereas viruses rely on human interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the types of malware covered in this chapter?

A
  • Ransomware
  • Trojan
  • Worm
  • Spyware
  • Bloatware
  • Virus
  • Keylogger
  • Logic bomb
  • Rootkit

These categories represent different forms of malicious software that can affect systems in various ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the primary focus of this chapter?

A

Exploring various types of malware and their distinguishing elements, behaviors, and traits.

Understanding these aspects is crucial for identifying and responding to malware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What should you analyze to identify malicious activity?

A

Indicators of malicious activity.

This involves looking for signs that may suggest the presence of malware on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Fill in the blank: ______________ helps ensure that attackers can retain access to systems once they’ve gained a foothold.

A

Rootkit

Rootkits are designed to conceal the existence of certain processes or programs from normal methods of detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

True or False: The chapter covers response methods organizations use to deal with malware.

A

True

Organizations need to have effective response methods to mitigate the impact of malware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is one of the objectives covered in this chapter related to the CompTIA Security+ exam?

A

Analyze indicators of malicious activity.

This objective is part of Domain 2.0: Threats, Vulnerabilities, and Mitigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What types of behaviors might indicate the presence of malware?

A
  • Unexpected system crashes
  • Slow performance
  • Unusual network activity
  • Unauthorized access attempts

These behaviors can serve as indicators for the detection of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Fill in the blank: Malware includes various forms such as ransomware, ____________, and viruses.

A

Worms

Worms are a type of malware that replicate themselves to spread to other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the purpose of controls mentioned in this chapter?

A

Help protect against malware.

Implementing controls is essential for preventing malware infections and minimizing risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What type of malware is known for encrypting files and demanding ransom?

A

Ransomware

Ransomware attacks can lead to significant data loss and financial impact if the ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

True or False: Spyware is designed to monitor user activity without their consent.

A

True

Spyware can collect sensitive information, such as login credentials and personal data.

36
Q

Which malware type is characterized by its ability to self-replicate and spread without user intervention?

A

Worm

Worms exploit vulnerabilities in networks to propagate themselves.

37
Q

What is malware?

A

A wide range of software intentionally designed to cause harm to systems, networks, or users

Malware can gather information, provide illicit access, and perform unwanted actions.

38
Q

What is ransomware?

A

Malware that takes over a computer and demands a ransom

Types of ransomware include crypto malware, which encrypts files.

39
Q

What are common delivery methods for ransomware?

A
  • Phishing campaigns
  • Direct attacks (e.g., Remote Desktop Protocol)
  • Exploiting vulnerable services or applications
40
Q

What are indicators of compromise (IoCs) for ransomware?

A
  • Command and control (C&C) traffic
  • Use of legitimate tools in abnormal ways
  • Encryption of files
  • Notices to users demanding ransom
  • Data exfiltration behaviors
41
Q

True or False: Paying a ransom guarantees that files will be returned.

A

False

In some cases, attackers demand more money even after payment.

42
Q

What are Trojans?

A

A type of malware disguised as legitimate software

They rely on users running them to gain access.

43
Q

What is an example of a Trojan?

A

Triada Trojan, which is distributed as a modified WhatsApp version

It gathers device information and allows further malicious actions.

44
Q

What are indicators of compromise for Trojans?

A
  • Signatures for malware applications
  • Command and control hostnames
  • Folders or files created on devices
45
Q

What is a botnet?

A

A group of systems under central command used by attackers

Individual systems are referred to as bots.

46
Q

How do worms differ from Trojans?

A

Worms self-replicate and spread without user interaction

Trojans require user action to be executed.

47
Q

What is the significance of the Stuxnet worm?

A

Recognized as the first implementation of a worm as a cyber weapon

Aimed at the Iranian nuclear program.

48
Q

What are some common IoCs for worms?

A
  • Known malicious files
  • Command and control contact
  • Malicious behaviors using system commands
49
Q

What is spyware?

A

Malware designed to obtain information about an individual or organization

It can track browsing habits and sensitive data.

50
Q

What are common forms of spyware?

A
  • Stalkerware
  • Keyloggers
  • Adware
51
Q

What is bloatware?

A

Unwanted applications preinstalled on systems by manufacturers

Not usually malicious but can add vulnerabilities.

52
Q

What are computer viruses?

A

Malicious programs that self-copy and self-replicate upon activation

They require an infection mechanism to spread.

53
Q

What are the types of computer viruses?

A
  • Memory-resident viruses
  • Non-memory-resident viruses
  • Boot sector viruses
  • Macro viruses
  • Email viruses
54
Q

What is a fileless virus?

A

A virus that spreads and operates without needing to store files on disk

It remains memory resident and exploits system vulnerabilities.

55
Q

Fill in the blank: Ransomware often demands a _______.

56
Q

True or False: All forms of spyware are considered malicious.

A

False

Some spyware is relatively innocuous.

57
Q

What is the main defense against ransomware?

A

An effective backup system that stores files separately

This ensures that files are recoverable if encrypted.

58
Q

What is the primary intention of spyware?

A

To gather information about the user or system

Its methods may vary, but the goal is information collection.

59
Q

What is the primary characteristic of fileless malware?

A

Remains memory resident throughout its active life, requiring no local file storage

Fileless malware injects itself into memory and can reinfect systems via techniques like Registry entries.

60
Q

What are the steps in a typical fileless virus attack chain?

A
  • Email link to a malicious website
  • Website exploits browser plugin vulnerability
  • Shell code runs command line script to download and execute the payload
  • Payload runs in memory and executes further attacks
  • Registry entry created to repeat shell code download and execution at boot

This flow illustrates how fileless malware operates without leaving traditional file artifacts.

61
Q

True or False: Fileless attacks can occur without the presence of software vulnerabilities.

A

False

Fileless attacks require a vulnerability to succeed.

62
Q

What types of defenses can help prevent fileless virus attacks?

A
  • Keeping browsers and plugins updated
  • Using antimalware tools to detect unexpected behaviors
  • Employing network-level defenses like intrusion prevention systems (IPSs)
  • Utilizing reputation-based protection systems

These measures can mitigate the risk of exploitation.

63
Q

What are IoCs related to viruses?

A
  • File hashes and signatures
  • Exfiltration activity
  • Process names
  • Known reference URLs

IoCs help in identifying malicious activities and are often found in threat feeds.

64
Q

What is a common practice for removing malware from an infected machine?

A

Wiping the drive and restoring it from a known good backup or reinstalling/reimaging it

This method ensures that the malware is completely removed, although some cases may require additional steps.

65
Q

Define keyloggers.

A

Programs that capture keystrokes and other input from devices

Keyloggers can capture mouse movements, touchscreen inputs, and credit card swipes.

66
Q

What are common methods to prevent software keylogging?

A
  • Implementing normal security best practices
  • Patching and systems management
  • Using antimalware tools
  • Employing multifactor authentication

Multifactor authentication helps mitigate the impact of keyloggers even if they are present.

67
Q

What is a logic bomb?

A

Code placed inside other programs that activates under specific conditions

Logic bombs are rare and can significantly impact systems if activated.

68
Q

How can malware be analyzed?

A
  • Online analysis tools like VirusTotal
  • Sandbox tools for behavior analysis
  • Manual code analysis of scripts
  • Tools like strings for artifact recovery

These techniques help security analysts evaluate potential malware.

69
Q

What are rootkits designed to do?

A

Allow attackers to access a system through a backdoor while concealing their presence

Rootkits use various techniques to avoid detection, complicating their removal.

70
Q

How can rootkits be detected?

A
  • Testing from a trusted system
  • Looking for typical behaviors and signatures
  • Integrity checking and data validation

Detection can be challenging due to the nature of rootkits.

71
Q

What are common IoCs for rootkits?

A
  • File hashes and signatures
  • Command and control domains, IP addresses
  • Behavior-based identification
  • Opening ports or creating reverse proxy tunnels

These indicators help in identifying rootkit activity.

72
Q

Fill in the blank: The best way to prevent rootkits is to use _______.

A

[normal security practices]

This includes patching and ensuring secure configurations.

73
Q

What is ransomware?

A

Malware that encrypts files and holds them for ransom paid via cryptocurrency

Ransomware is one of the most common forms of malware targeting victims.

74
Q

What are Trojans?

A

Malware disguised as legitimate software that takes malicious action once downloaded and run

Trojans can trick users into installing them by appearing harmless.

75
Q

How do worms spread?

A

They spread themselves on networks via vulnerable services, email, or file shares

Worms can replicate and spread without user intervention.

76
Q

What distinguishes a virus from other malware?

A

Viruses infect local systems and often require user action to spread

Unlike worms, viruses do not self-replicate over networks.

77
Q

What is spyware?

A

Malicious software intended to gather information about users, systems, and networks

Spyware sends collected information back to remote systems or command and control servers.

78
Q

What is a keylogger?

A

A specialized type of spyware that captures keystrokes

Keyloggers can exist in both software and hardware forms.

79
Q

What are rootkits used for?

A

To retain access to a system and conceal malicious actions

Rootkits often help attackers maintain a foothold on compromised systems.

80
Q

What is a logic bomb?

A

Code that executes unwanted actions under specific conditions

Logic bombs typically need to be identified by reviewing source code or scripts.

81
Q

Define bloatware.

A

Unwanted software installed on systems by vendors or as part of software packages

Bloatware takes up resources and can be vulnerable to attacks.

82
Q

What are some methods to fight malware?

A

Antivirus tools, endpoint detection and response tools, configuration, and patching

Awareness is often the most effective tool in preventing and responding to malware attacks.

83
Q

Fill in the blank: Keyloggers are a specialized type of _______.

A

spyware

Keyloggers track user keystrokes, which can lead to sensitive information being compromised.

84
Q

True or False: Bloatware is considered malicious software.

A

False

Bloatware is not truly malicious but can be vulnerable to attacks.

85
Q

What is the primary purpose of rootkits?

A

To conceal malicious action and maintain access to a compromised system

Rootkits work in conjunction with other malware to protect the attacker’s presence.