Malware Flashcards
Malware-ology
1
Q
How can Malware establish persistence to survive a reboot (WIN) ?
A
- AutoStart
- Service Creation / Replacement
- Service Failure Recovery
- Scheduled Tasks
- DLL Hijacking
- WMI Event Consumer
- Local Group Policy
- Ms Office Add-On
- BIOS flashing
2
Q
What are some common Malware defense evasion techniques ?
A
- Service Hijacking
- Service Replacement
- Process Injection
- Filename / Service hijacking
- Alternate Data Streams
- Webshells / Beacons
- firmware updates
- DLL Injection
- A/V Bypass
- Rootkits (hooking)
- Binary Padding
- Packing / Armouring
- Trusted Code Sigining (malware is signed)
3
Q
What are some common malware locations ?
A
- \Temp
- \Windows
- \Win\SxS
- \System Volume
- \Recycle Bin
- \Program Files
- temporary internet files