L6: Adv. Malware Analysis Flashcards

1
Q

A signature scanner that tries to identify malware that has been obfuscated/packed by its unique strings would not be effective

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Each instance of packed Malware looks different, but there is always a signature or pattern across all instances.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Code that reverses the pre-runtime transformation of packed malware is included in the executable.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Even for the same malware program, each packed instance will look different, and therefore a signature based approach is not effective in detecting the malware.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rootkits are an example of Malware hiding from:

a. Users
b. Security
c. Researchers

A

Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mapping security sites and honey pots to avoid them is an example of Malware hiding from:

a. Users
b. Security
c. Researchers

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Using nonce-based encryption methods is an example of Malware hiding from:

a. Users
b. Security
c. Researchers

A

Researchers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rank the following malware analysis categories from easiest to hardest:

i. Static Properties Analysis
ii. Manual Code Reversing
iii. Fully Automated Analysis
iv. Interactive Behavior Analysis

A

i. Fully Automated Analysis
ii Static Properties Analysis
iii. Interactive Behavior Analysis
iv. Manual Code Reversing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rank the following malware analysis categories based on how much information can be revealed:

i. Static Properties Analysis
ii. Manual Code Reversing
iii. Fully Automated Analysis
iv. Interactive Behavior Analysis

A

i. Manual Code Reversing
ii. Interactive Behavior Analysis
iii. Static Properties Analysis
iv. Fully Automated Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In order to achieve transparency, a malware analyzer needs to run at a higher privilege than the malware.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The most challenging transparency requirement is the identical notion of time.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly