M7: Malware - C.7 Flashcards

To cement key concepts about Malware

1
Q

Definition of Malware

A

Software purposefully designed to have effects that are not in the users best interest. P. 184

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition of Harmful software

A

Software that causes some damage, either deliberately (Malware) or inadvertently due to poor design/implementation etc. P. 184

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware vs Harmful software

A

Harmful software includes software, which inadvertently causes harm, while Malware only includes software that intentionally causes it. Thus Malware is a subcatagory of Harmful software P. 184

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What makes Malware hard to detect? Big picture

A

It is often less about what it does and more about what the intent is. Such as a remote desktop connection. It also depends on ones definition of Malware, are adds Malicious or gathering data. P. 185

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definition of Virus

A

A program that can infect other programs or files by modifying them to include a copy of themselves. P. 186

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a virus work

A

They inject themselves into other programs or files, in such a way that they are executed when the host program is executed. They can coexist or coopt the host depending on design. P. 186

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Life cycle of a Virus

A

1) Dormant - waiting for host execution
2) Propagation - when host is executed virus attempts to propagate to other hosts (programs, devices etc)
3) Trigger condition - determines if the conditions are right for payload deployment
4) Payload - The malicious payload is executed. P. 187

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Life cycle of a Worm

A

1) Propagation - automatic and continued propagation
3) Trigger condition - determines if the conditions are right for payload deployment
4) Payload - The malicious payload is executed. P. 187

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worm vs Virus

A

Worms propagate automatically - Viruses rely on user interaction
Worms propagate directly over the network - Viruses propagate on and through hosts
Worms exploit software vulnerabilities - Viruses abuse software features or rely on social engineering P. 187

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Email-Based Malware

A

Spreads through the email attachments and email infrastructure. Often referred to as Email Virus, Email Worms or Mass-Mailing Worm-Virus. It spread rapidly often using the victims email and contact lists to find new targets. P. 187

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus infected programs.

A

Viruses either:
1) Prepend virus before code. Retains program. Increasing file size
2) Append virus after code. Retains program. Increasing file size
3) Overwrite from top. Destroys program. Retains file size
4) Overwrite center. Destroys program. Retains file size
5) Other variants exists
P. 187-188

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virus infected Datafiles

A

Modern text files requires special processing to display and are thus vulnerable to virus and/or malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can all viruses be detected by a single program?

A

No. A virus could simply not deploy if it detects an antivirus program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus detection strategies

A

1) Malware signatures - Deny listing
2) Integrity checking - Allow listing
3) Behavioral Signatures
4) Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virus detection - Malware signatures

A

Short byte sequences that identify a program as a known malware. Candidates are compared to known Malware lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virus detection - Integrity Checking

A

Program hash is compared against known valid hash of program.

17
Q

Virus detection - Behavioral Signatures

A

Malware is detected by certain sequences of actions such as massive file deletion or use of system calls etc.

18
Q

Virus detection - Sandboxing

A

Emulating a program usually briefly to detect suspicious behavior

19
Q

Virus Anti-Detection - Code hiding/Obfuscation

A

1) Encryption
2) Polymorphism
3) Metamorphism

20
Q

Virus Anti-Detection - Hiding tracks

A

Techniques aim to hide
1) Changes to filesystem attributes (length, timestamp etc)
2) Location of existing code
3) Processes
4) Resources used

21
Q

Virus Anti-Detection - Encryption

A

Virus source code is encrypted to hide details from manual and automatic inspection. Virus must first decrypt itself before it can be executed.

22
Q

Virus Anti-Detection - Polymorphism

A

Virus is encrypted and each new instance of the virus makes changes to its decryption portion using a mutation engine.

23
Q

Virus Anti-Detection - Metamorphism

A

Virus is unencrypted. Each new instance makes extensive changes to itself using a mutation engine. Including body, payload and the mutation engine itself.

24
Q

Malware - Auto-Rooters

A

Malicious program that scans networks looking for vulnerable targets, on which it can obtain a reverse shell and/or install a rootkit. Many are point and click and require no special skills to use.

25
Q

Worms - Context aware spreading

A

Worms spread over networks. If a vulnerable machine exists in one part of a network, then computer topographically close to it are more likely to also exhibit the same vulnerabilities.

26
Q

Worms - Optimized spreading

A

1) Hit-list scanning - list of high likelihood targets
2) Permutation scanning - methods to avoid contacting already contacted servers by other infected servers.
3) Internet-scale hit-lists - pre-scan of internet to detect devices potentially vulnerable

27
Q

What is keylogger?

A

A malware that logs activity on the keyboard

28
Q

Types of malware/Virus

A
  • Virus
  • Malware
  • Trojan
  • Backdoor
  • Rootkit Bootkit
  • Keylogger
  • Wiper
  • Ransomware
  • RAT
  • CrimeWare
  • C2 Scripts
29
Q

What is Crimeware?

A

Common description for maleware used by cyber criminals. Does not say what the malware does.

30
Q

What layers can malware be found Malware in?

A
  • OS - application
  • Kernel
  • Assembler
  • Firmware
  • Hardware
31
Q

What are the advantages/disadvantages of malware in lower levels?

A

The lower the lever, the more limited tools, but easier to hide.