Lecture 10: Malware Flashcards
List some techniques used for propagation of malware
- Virus
- Trojan horse
- Worm
- Backdoor
- Attack kit
- Auto-rooter
- Downloader
List some techniques used as payloads in malware
- Adware
- Flooders
- Keyloggers, Spyware
- Zombie, bomb
- Logic bomb
- Ransomware
- Rootkit
- Spammers
Explain what a “Worm” is, and how it works
- Replicating program that propagates over net
o Using email, remote exec, SW flaw (USB stick)
o Zero-day exploit
o Old bugs (NSA Leakage, Server Message Block (SMB), etc.) - Has phases:
o Does not damage the system immediately
o Propagation phase: searches for other systems, connects to it, copies self to it and runs
Explain what a “Virus” is, and how it works
- Piece of software that infects programs
o Modifying them to include a copy of the virus
o So, it executes secretly when host program is run
List the four phases of a typical “Virus”
- A typical virus goes through phases of: o Dormant o Propagation o Triggering o Execution
List the four components of a typical “virus”
o Infection mechanism – enables replication
o Modification engine – for disguise
o Trigger – event that makes payload activate
o Payload – what it does, malicious or benign
List some techniques a virus can use in order to hide itself
- Naïve (simply self replicating)
- Compress parts of self to hide size
- Encryption
- Polymorphism
Explain how a “Naïve (simply self replicating) virus” can easily be found by virus protection software
A Naïve (simply self-replicating) virus can be detected by changing file size of infected programs
Explain how a (partially) compressed “virus” can be found by virus protection software
- Detection can be done through inspecting contents of potentially infected programs,
- Checking the signature of potentially infected programs, or
- Examining if a program contains the fixed code V of a virus
Explain how “Encrypted viruses” work
o Generate key o Encrypt virus body o Copy ♣ The bootstrap (decryption engine with key), and ♣ The encrypted virus body o When start ♣ Decrypt the virus body ♣ Execute
Explain how an “Encrypted Virus” can be found by virus protection software
We can look for program signature, and inspect if contents of program has changed
Briefly explain how “Polymorphic viruses” work
o Rebuild the whole virus at every infection to something functionally identical
♣ Either add non-functional code, or
♣ Re-order instructions
Briefly explain how a “Polymorphic Virus” can be found by virus protection software
o Focus on the decryption engine
Explain what a “Macro Virus” is, how it works, and some of its strengths
• Exploit macro/scripting capability of apps o Basic, Elisp, Javascript, … • Why: o Platform independent o Infects documents o Is easily spread
Give an example of an “E-mail Virus”, and how it works
• E.g. Melissa o Exploits MS Word Macro in attached doc o If attachment opened, macro activates o Sends email to all users in the address-book, and o does local damage