Malware Flashcards
What are the common types of malware
Boot sector
Macro
Program
Multi Partite
encrypted
polymorphic
metamorphic
stealth
armored
Hoax
Describe Boot Sector viruses
Stored in the first sector of a HD and is loaded into memory upon boot up
Difficult to detect since it is running before the OS
Describe Macro viruses
Viruses embedded into a document and is executed when the document is opened by the user
Describe program viruses
Infect an executable or application
targets programs, installs itself, then is activated each time the program runs
Describe multiPartite
virus that combines boot sector and program viruses.
First attaches itself to the boot secure and system files before affecting other files on the computer
You can clear out the programs that are infected, but as soon as the PC is rebooted, the boot sector runs and infects the PC again.
explain encrypted viruses
Virus that uses a cipher to encrypt itself to avoid detection by AV
Describe Polymorphic viruses
Advanced version of an encrypted virus
Changes itself every time it is executed by altering the decryption module, which assists in avoiding detection
prevents AV detection by changing signature
Describe metamorphic viruses
virus that is able to rewrite itself entirely before it attempts to infect a file
Advanced form of polymorphic
Describe a stealth virus
Category of virus that uses various techniques to avoid detection
Describe an armored virus
Virus that has a layer of protection to confuse a program or person analyzing it.
What is a hoax virus
Not exactly a virus, but an attempt to trick a user into infecting their computer using a message or website
Describe a Worm
Malicious software like a virus, but is able to replicate itself without user intervention
Self replicates and takes advantages of security holes in oses and apps
can cause network traffic congestion as it consumes resources as it spreads
describe trojans
piece of malicious software that is disguised as harmless or desirable software
performs desired functions and malicious functions
Remote access trojan most common form
Describe spyware
malware that secretly gathers information with user consent
Comes from website or 3rd part software
Searches source files, emails, messages
May also include a keylogger
Describe adware
adware is used just to collect info in order to send adds to a user