Malware Flashcards

1
Q

Major Infection Channels

A

2 biggest:

  • spam email
  • > send a lot of mails
  • > targeted mails to specific person
  • software exploration
  • > venerability in Web browsers
  • > untrusted media
  • > files or software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ransomware

A
  • generate local symmetric K_s
  • encrypt all files with K_s
  • encrypt K_s with public of attacker
  • send K’ = asym_enc(K_s, pubkey) to remote server
  • delete K_s from victim device

-> victims pays to get privkey - asymm_dec(K’, privkey)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Banking Trojan

A
  • steal money
    e. g.
  • web site manipulation
  • IAT Hooking
  • > change jump address in Import Address Table(contains pointer to library)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RATs / RAT Trojans

A
  • > Remote Administration Tools

- essentials control computer remotely; search files controls mouse and keyboard, install applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spambots

A
  • spams, post twitter accounts, sells emails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DDoS Bots

A
  • floods a page with request or something like that

- server is overloaded -> not reachable anymore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fake AV (Fake Anti-Virus) / Scareware / Rogueware

A
  • pretends to be fake anti virus or something like that user pay to remove
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adware

A
  • runs in background of compute rand clicks on adds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Crypto-mining

A
  • use CPU and energy cost of other computer to mine for yourself crypto
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dialers

A
  • call over phone premium numbers and make money of that
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worms

A
  • self spreading malware
  • > infects system and searchs how to infect more systems
  • > infections spreads faster then fixing bug
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rootkits

A
  • sits in system and hide from anti-virus software
  • user mode:
  • > inject malicious library
  • > inject backdoor into processes
  • kernel mode:
  • > rewrite sys call tabels to point to malicious code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Command & Control: Communication Protocols

A
  • tries to hide communication
    -> blend into HTTPS traffic
    -> abuses DNS for exchanging data
    also possible on top of UDP/TCP
    -> easily detected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

C&C: Centralized Architectures

A
  • one centralised server
  • > bots connect down/upload

=> single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

C&C: Domain Generation Algorithms

A
  • generate several domains where bots can communicate over

- if alg. leaked it’s over

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

C&C: Peer-to-Peer (P2P) Botnets

A
-> bots make up network with
Structured:
- distributed hash table
- commando stored at ID
unstructured:
- no hash table
- command via broadcast