Malware Flashcards

1
Q

Malware is….

A

Any software that has been created to damage, disable, or produce an unwanted condition within a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A virus is…

A

Intentionally malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Self-replicating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan

A

Malware hidden in legitimate files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RAT

A

Remote access trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Keylogger

A

Logs keystrokes and sends to a controller for credential theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rootkit

A

Parts of or the entire bootloader has changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What defeats rootkits?

A

Secure boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firmware Rootkit

A

Operates lower than a bootloader. Overwrites the firmware of the BIOS so that the malware is persisted before the bootloader starts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Kernel Rootkit

A

Malicious drivers/kernel modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application rootkit

A

Modification of regular files to hide malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Memory rootkit

A

FIleless process running in memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backdoor

A

Persistent control of a system by offering recurring access to an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware.\

A

Encrypts a victims files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

File wipers

A

Destructive malware that destroys or corrupts files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who are you defending against in malware?

A

A human adversary, not a piece of software.

17
Q

What was the first worm to garner public attention?

A

The morris worm

18
Q

When was the morris worm created?

A

1988

19
Q

Who created the morris worm?

A

Robert Tappan Morris

20
Q

What was Morris charged with?

A

Computer Fraud and Abuse Act.

21
Q

Stuxnet.

A

The first digital weapon, used to target an Iranian nuclear facility in 2010

22
Q

WannaCry

A

Widespread ransomware worm in 2017

23
Q

NotPetya

A

Ransomware by Russian military against Ukraine in 2017

24
Q

What are the two types of ransomware encryption techniques?

A

Hard coded keys - key is easily discoverable.
Client generated keys - Still easily discoverable, but key is not reusable to decrypt all infections.
Key -> server - Generate key during infection, and send to server for storage. Hard to discover.
Bake public key into ransomware & store private on server
Bake public key into the client & don’t store any keys (send to server
Use a hybrid - best of all worlds

25
Q

Two ways to analyze malware

A

Static analysis - the file
Dynamic Analysis - behavior

26
Q

What is fingerprinting?

A

Obtaining a hash of the malicious binary

27
Q

What is string extraction?

A

Look for malicious strings (IP, URL, etc.)

28
Q

What is Packer Analysis

A

Looking for packed files that are hidden in other files

29
Q

What is disassembly/decompilation?

A

Analyzing the files manually to look for malicious code.

30
Q

YARA Rules

A

Schema to classify malware through text-based rules.

31
Q

Machine Learning for malware analysis

A

Corpus - the set of malware trained.

32
Q

Defined Point Analysis (Dynamic)

A

Malware is executed on a system with a known state.

33
Q

Runtime behavior analysis (Dynamic)

A

Observe the behavior directly in a sandboxed environment.

34
Q

What does modern malware do to manage its keys?

A

Generates a client key and uses a hardcoded server public key. This is known as the hybrid method.

35
Q

What time of malware is used for cryptomining and DDoS attacks?

A

Botnets

36
Q

When statically analyzing malware using machine learning, was must be done to the malware file before the ML model makes a decision?

A

FX

37
Q

What malware was the first digital weapon?

A

Stuxnet