Chapter 6 - Malicious Code Activity Flashcards

1
Q

Does a virus have to be executed to infect a system?

A

yes - simply downloading malware does not execute/deliver the payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Stealth Viruses?

A

Stealth Viruses hide themselves from AV by providing AV with misleading information such as misreporting file size when the file executes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Armoured Viruses?

A

Armoured viruses make it difficult for researchers to reverse-engineer virus code.

This is done through the use of compilers in conjunction with encryption to make code decryption difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Polymorphic Viruses?

A

Polymorphic viruses mutate each time they replicate through different encryption means each time a virus executes.

This makes IOC detection difficult for AV as IOC for each virus would be different from each other even though purpose remains the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Metamorphic Viruses?

A

Metamorphic viruses actually alter their code slightly when they replicate / execute.

This alters a number of things for the virus and makes detection more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Boot-Sector viruses?

A

Boot sector viruses reside in the device’s boot sector and executes when the system is booted/rebooted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Multipartite Viruses?

A

Multipartite viruses are multi-dimensional viruses such as a boot-sector virus infecting different files and have metamorphic capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Macro Viruses?

A

Macro Viruses reside in MS Office document as a macro function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Worms?

A

Worms travel along a network looking for hosts to infect and they typically do not need user interaction to execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Trojan Horses?

A

Trojan Horse are malicious applications masquerading as something benign and safe.

Many trojans install a RAT once a system is infected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Remote Access Tools (RATs)?

A

Remote Access Tools grant attackers access to a system remotely via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Scareware?

A

Scareware are malware that disguises themselves as AV software instructing the user to install the software / pay for services they do not need.

Scareware can be RATs, Trojans, worms - the scareware part is simply a delivery method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Logic Bombs?

A

Logic Bombs are malware that executes when certain defined criteria are met such as time, date, system the malware reaches etc.

Keyloggers can have a logic bomb capability where it sends data once it detects that the user is on a banking website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Ransomware?

A

Ransomware is malware that blackmails the user to handing over sums of money in exchange for decrypting their systems, promising not to expose sensitive information etc.

This type of attack will typically have a time component to instil panic for the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are keyloggers?

A

Keyloggers are software/hardware based tools that captures a system’s keystrokes.

Data is then exfiltrated out to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Rootkits?

A

Rootkits are programs that run on systems that remains largely undetected as it has root-level access to the system.

Rootkits can detect system scans and hide itself from the scan or restrict scan data from returning any results.

Rootkits are typically installed via trojans.

17
Q

Name some examples of malicious mobile code?

A

Scripts

Java Applets

VBA macros/scripts

18
Q

What are application backdoor/trapdoors?

A

Application backdoors provide a user access to the application and its code through covert means.

Usually installed by developers for debugging purposes.

19
Q

What are Spywar?

A

Software that aims to spy on the machine it is installed in such as accessing email, photos, location etc.

20
Q

Name some Malware Delivery Methods?

A

Drive-By-Downloads
- web servers hosting malicious code and the user interacts with this webpage

Malvertising
- Website hosted ads can be malicious and intend to infect a user’s machine

Email Delivery
- Most common delivery method through phishing campaigns

Hardware Delivery
- User plugs in hardware device into their machine such as USB drives, CD drives etc.

21
Q

What are some of the common countermeasures against malicious code?

A

AV in all systems
AV signature DB updated
Anti-Spam filtering
Content filtering FWs
Patched systems

22
Q

What is Fuzzy Hashing in relation to AV signature matching?

A

Fuzzy Hashing is the degree matching of file hashes.

Instead of 100% file hash match, AV signatures may be content with a degree of similarity with previously identified viruses.

23
Q

What is Behaviour Based Detection based on?

A

Heuristic Signals

24
Q

How does Sender Policy Framework (SPF) function?

A

SPF provides a method to identify spoofed email address

SPF records identify email servers that are authorized to send out email for a specific domain.

If an email has originated from an unauthorized email server then this fails SPF.

For example - Gmail will publish servers that are authorized to send out gmail emails, any gmail not originating from this list of servers does not pass SPF.

25
Q

How does Domain Keys Identified Mail (DKIM) work?

A

DKIM works by sending a certificate / digital signatures along with the email for authentication and verification of the email.

26
Q

What is DMARC?

A

DMARC is an extension of SPF and DKIM which allows domain owners to publish a policy to state whether they are using SPF or DKIM for verification.

27
Q

What are content filtering appliances?

A

Content Filtering Appliances is a hardware device that filter traffic in and out of a network actively monitoring data streams and inspecting them for malicious code activity or behaviour.