Malware Analysis Flashcards
In InfoSec and Malware Analysis, what is sheep dipping?
the analysis of suspicious files, incoming messages, etc., for malware. The users isolate the sheep-dipped computer from other computers on the network to block any malware from entering the system
Some tasks that are run during the sheep dipping process.
- Run user, group permission, and process monitors
- Run port and network monitors
- Run device driver and file monitors
- Run registry and kernel monitors
A tool that provides information about the files in the organization such as the full path of the file, date of creation, date of modification, file size, file attributes, file version, and extension to compare similar files and identify any changes to the data
HashMyFile
A collection of computer software that detects and analyzes malicious code threats such as viruses, worms, and Trojans. It is used along with sheep dip computers.
Antivirus Sensor Scan
A process of reverse engineering a specific piece of malware to determine its origin, functionality, and potential impact
Malware Analysis
A phishing tool used to phish user credentials from various social networking platforms such as Instagram, Facebook, Twitter, and LinkedIn. It also displays the victim system’s public IP address, browser information, hostname, geolocation, and other information
ShellPhish
A giant neighborhood watch scheme, empowering the most alert and most expert members to defend everyone within the community against phishing attacks. Provides updated information about sites that users visit regularly and blocks dangerous sites
Netcraft
Restricts access to files, folders, and drivers by locking, hiding, or password-protecting them. Attackers can thus use this tool for these purposes. With this program, nobody can access or destroy the attacker’s data without a password
Gilisoft Filelock Pro
a tool to check active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics, and IPv6 statistics.
Netstat
a tool to extract the embedded strings in the file into a readable format
Bintext
going through the executable binary code without actually executing it to have a better understanding of the malware and its purpose
Static malware analysis
A tool with the following characteristics
Reliable capture of process details, including image path, command line, user and session ID.
Configurable and moveable columns for any event property.
Filters can be set for any data field, including fields not configured as columns.
Advanced logging architecture scales to tens of millions of captured events and gigabytes of log data.
Process tree tool shows the relationship of all processes referenced in a trace.
Native log format preserves all data for loading in a different Process Monitor instance
Process Monitor
taking a snapshot of the system at the time the malware analysis begins
System Baselining
The .dll file used by the Zeus Trojan to access and manipulate Service Manager and Registry on a victim machine
Advapi32.dll
used to detect suspicious startup programs and processes
Startup Monitoring