M7: Malware - C.7 Flashcards

To cement key concepts about Malware

1
Q

Definition of Malware

M7: Malware - C.7

A

Software purposefully designed to have effects that are not in the users best interest. P. 184

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition of Harmful software

M7: Malware - C.7

A

Software that causes some damage, either deliberately (Malware) or inadvertently due to poor design/implementation etc. P. 184

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware vs Harmful software

M7: Malware - C.7

A

Harmful software includes software, which inadvertently causes harm, while Malware only includes software that intentionally causes it. Thus Malware is a subcatagory of Harmful software P. 184

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What makes Malware hard to detect? Big picture

M7: Malware - C.7

A

It is often less about what it does and more about what the intent is. Such as a remote desktop connection. It also depends on ones definition of Malware, are adds Malicious or gathering data. P. 185

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definition of Virus

M7: Malware - C.7

A

A program that can infect other programs or files by modifying them to include a copy of themselves. P. 186

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a virus work

M7: Malware - C.7

A

They inject themselves into other programs or files, in such a way that they are executed when the host program is executed. They can coexist or coopt the host depending on design. P. 186

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Life cycle of a Virus

M7: Malware - C.7

A

1) Dormant - waiting for host execution
2) Propagation - when host is executed virus attempts to propagate to other hosts (programs, devices etc)
3) Trigger condition - determines if the conditions are right for payload deployment
4) Payload - The malicious payload is executed. P. 187

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Life cycle of a Worm

M7: Malware - C.7

A

1) Propagation - automatic and continued propagation
3) Trigger condition - determines if the conditions are right for payload deployment
4) Payload - The malicious payload is executed. P. 187

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worm vs Virus

M7: Malware - C.7

A

Worms propagate automatically - Viruses rely on user interaction
Worms propagate directly over the network - Viruses propagate on and through hosts
Worms exploit software vulnerabilities - Viruses abuse software features or rely on social engineering P. 187

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Email-Based Malware

M7: Malware - C.7

A

Spreads through the email attachments and email infrastructure. Often referred to as Email Virus, Email Worms or Mass-Mailing Worm-Virus. It spread rapidly often using the victims email and contact lists to find new targets. P. 187

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus infected programs.

M7: Malware - C.7

A

Viruses either:
1) Prepend virus before code. Retains program. Increasing file size
2) Append virus after code. Retains program. Increasing file size
3) Overwrite from top. Destroys program. Retains file size
4) Overwrite center. Destroys program. Retains file size
5) Other variants exists
P. 187-188

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virus infected Datafiles

M7: Malware - C.7

A

Modern text files requires special processing to display and are thus vulnerable to virus and/or malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can all viruses be detected by a single program?

M7: Malware - C.7

A

No. A virus could simply not deploy if it detects an antivirus program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus detection strategies

M7: Malware - C.7

A

1) Malware signatures - Deny listing
2) Integrity checking - Allow listing
3) Behavioral Signatures
4) Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virus detection - Malware signatures

M7: Malware - C.7

A

Short byte sequences that identify a program as a known malware. Candidates are compared to known Malware lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virus detection - Integrity Checking

M7: Malware - C.7

A

Program hash is compared against known valid hash of program.

17
Q

Virus detection - Behavioral Signatures

M7: Malware - C.7

A

Malware is detected by certain sequences of actions such as massive file deletion or use of system calls etc.

18
Q

Virus detection - Sandboxing

M7: Malware - C.7

A

Emulating a program usually briefly to detect suspicious behavior

19
Q

Virus Anti-Detection - Code hiding/Obfuscation

M7: Malware - C.7

A

1) Encryption
2) Polymorphism
3) Metamorphism

20
Q

Virus Anti-Detection - Hiding tracks

M7: Malware - C.7

A

Techniques aim to hide
1) Changes to filesystem attributes (length, timestamp etc)
2) Location of existing code
3) Processes
4) Resources used

21
Q

Virus Anti-Detection - Encryption

M7: Malware - C.7

A

Virus source code is encrypted to hide details from manual and automatic inspection. Virus must first decrypt itself before it can be executed.

22
Q

Virus Anti-Detection - Polymorphism

M7: Malware - C.7

A

Virus is encrypted and each new instance of the virus makes changes to its decryption portion using a mutation engine.

23
Q

Virus Anti-Detection - Metamorphism

M7: Malware - C.7

A

Virus is unencrypted. Each new instance makes extensive changes to itself using a mutation engine. Including body, payload and the mutation engine itself.

24
Q

Malware - Auto-Rooters

M7: Malware - C.7

A

Malicious program that scans networks looking for vulnerable targets, on which it can obtain a reverse shell and/or install a rootkit. Many are point and click and require no special skills to use.

25
Q

Worms - Context aware spreading

M7: Malware - C.7

A

Worms spread over networks. If a vulnerable machine exists in one part of a network, then computer topographically close to it are more likely to also exhibit the same vulnerabilities.

26
Q

Worms - Optimized spreading

M7: Malware - C.7

A

1) Hit-list scanning - list of high likelihood targets
2) Permutation scanning - methods to avoid contacting already contacted servers by other infected servers.
3) Internet-scale hit-lists - pre-scan of internet to detect devices potentially vulnerable

27
Q

What is keylogger?

M7: Malware - C.7

A

A malware that logs activity on the keyboard

28
Q

Types of malware/Virus

M7: Malware - C.7

A
  • Virus
  • Malware
  • Trojan
  • Backdoor
  • Rootkit Bootkit
  • Keylogger
  • Wiper
  • Ransomware
  • RAT
  • CrimeWare
  • C2 Scripts
29
Q

What is Crimeware?

M7: Malware - C.7

A

Common description for maleware used by cyber criminals. Does not say what the malware does.

30
Q

What layers can malware be found Malware in?

M7: Malware - C.7

A
  • OS - application
  • Kernel
  • Assembler
  • Firmware
  • Hardware
31
Q

What are the advantages/disadvantages of malware in lower levels?

M7: Malware - C.7

A

The lower the lever, the more limited tools, but easier to hide.