Malware Flashcards

1
Q

What information does static analysis provide?

A

File type
File hash
Strings
Embedded Elements Packer information
Imports / exports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Benefits of static analysis

A

Speed
Safety
Comprehensive Insight
Detection of known threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Limitations of black box

A

Inability to detect runtime behavior
complexity with Obfuscation
False Positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Five Ws of analysis

A

Who
What
When
Where
Why

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of destructive malware?

A

Ransomware
Wiper
Virus
Worm
Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

First step before extracting malware?

A

Create an image of the HDD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is whiteboxing? and What Ws are covered

A

Reverse Engineering code of malware … which is Who and Why

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

A

Monitors user activity and collects personal information without consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Botnet?

A

Network of infected computers controllected by an attacker to perform coordinated tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Keyloggers?

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is blackboxing?

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is motive types? (Why)

A

Financial gain
Hacktivism
Corporate Espionage
Curiosity/Challenge
State
Personal Vendetta

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Victims (Who?)

A

Individuals
Corporations
Governments
Non-Profits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Methods (How and Where)

A

Phishing
Malware
Exploiting Vulnerabilities
Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Timeline (When?)

A

Often over extended timelines due to delayed detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Malware Symptoms

A

Slow
Freezing or Crashing
Diminished Storage Space
Popups
Deleted or modified files
New programs or icons
changes in security setting
unusual network activity
browser changes
programs running without consent
error messages
suspicious applications

17
Q

Malware Spreading Techiques

A

Phishing attacks
malvertising
Drive-by downloads
Social Engineering
Malicious Links in Social Media
Software Bundling
Remote Desktop Protocol (RDP)
Lateral Movement

18
Q

Typosquatting

A

involving registering domains name is similar to legitimate sites hoping users will mistype

19
Q

Torrents / Peer to Peer Sharing

A

disguised malware as pirated content

20
Q

Infected Removable Media

A

malware is spread through removable media

21
Q

Exploiting Unpatched Vulnerabilities

A

unpatched vulnerabilities using exploit kits designed for this purpose

22
Q

ransomware

A

encrypts files and demands payments for decryption

23
Q

Wiper

A

Deletes data rather than holding it for ransom

24
Q

Viruses

A

Attaches itself to legitimate programs and replicates to infect other files

25
Worms
selfreplicating malware that spreads across networks without user action
26