Malware Analysis Flashcards
Downloader
Used to download the primary malware or additional tools
Ex- Office documents
Dropper
Similar to Downloader but has the malware embedded within and will not rely upon retrieval from the internet, although the dropped payload may.
Loaders
Used to download additional malware, will likely persist on the host and use a variety of techniques for command and control
Boot Integrity
Using a secure method to boot a system and verify the integrity of the OS and loading mechanism
UEFI
Unified Extensible Firmware Interface
Specification for a software program that connects a computer’s firmware to its OS
Installed at time of manufacturing and is the first program that runs when a computer is turned on
Checks to see what hardware components the device has, wakes them up, and hands them over to the OS
Measured Boot
Checks each startup component, including the firmware all the way to the boot drivers
Stores this info in the TPM and can send it to a trusted server that can objectively assess the PC’s health
Boot Attestation
Enables a remote platform to measure and report its system state in a secure way to a third party
Code Signing
Process of digitally signing executables and scripts to confirm the software author can guarantee that the code has not been altered or corrupted since it was signed