Lecture 6 Flashcards

1
Q

Malware infection can be broken into five steps what are they?

A

Delivery: How it got onto the machine.
Execution: What does the malware actually do.
Persistence: How does the malware stay on the machine after things like restarts.
Propagation: How does the malware transmit itself to other machines.
Communication: Who is the malware communicating too eg servers during existence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Once you have detected malware how do you share this information?

A

You create a signature. eg Yara.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Challenges with static analysis?

A

New malware needs to be up-to-date and code obfuscation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is code obfuscation?

A

The process of obscuring meaningful information. Eg packing or encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly