L6: Adv. Malware Analysis Flashcards
A signature scanner that tries to identify malware that has been obfuscated/packed by its unique strings would not be effective
True
Each instance of packed Malware looks different, but there is always a signature or pattern across all instances.
False
Code that reverses the pre-runtime transformation of packed malware is included in the executable.
True
Even for the same malware program, each packed instance will look different, and therefore a signature based approach is not effective in detecting the malware.
True
Rootkits are an example of Malware hiding from:
a. Users
b. Security
c. Researchers
Users
Mapping security sites and honey pots to avoid them is an example of Malware hiding from:
a. Users
b. Security
c. Researchers
Security
Using nonce-based encryption methods is an example of Malware hiding from:
a. Users
b. Security
c. Researchers
Researchers
Rank the following malware analysis categories from easiest to hardest:
i. Static Properties Analysis
ii. Manual Code Reversing
iii. Fully Automated Analysis
iv. Interactive Behavior Analysis
i. Fully Automated Analysis
ii Static Properties Analysis
iii. Interactive Behavior Analysis
iv. Manual Code Reversing
Rank the following malware analysis categories based on how much information can be revealed:
i. Static Properties Analysis
ii. Manual Code Reversing
iii. Fully Automated Analysis
iv. Interactive Behavior Analysis
i. Manual Code Reversing
ii. Interactive Behavior Analysis
iii. Static Properties Analysis
iv. Fully Automated Analysis
In order to achieve transparency, a malware analyzer needs to run at a higher privilege than the malware.
True
The most challenging transparency requirement is the identical notion of time.
True