Lecture 6 Flashcards
1
Q
Malware infection can be broken into five steps what are they?
A
Delivery: How it got onto the machine.
Execution: What does the malware actually do.
Persistence: How does the malware stay on the machine after things like restarts.
Propagation: How does the malware transmit itself to other machines.
Communication: Who is the malware communicating too eg servers during existence.
2
Q
Once you have detected malware how do you share this information?
A
You create a signature. eg Yara.
3
Q
Challenges with static analysis?
A
New malware needs to be up-to-date and code obfuscation.
4
Q
What is code obfuscation?
A
The process of obscuring meaningful information. Eg packing or encryption.