Malware Families Flashcards
What is a Virus
a virus is a malicious code whose primary function is to replicate and to deliver its payload. And remember that we said, a virus requires a host to execute and replicate.
Boot Sector Virus
boot sector virus infects the boot or the first sector of a drive then loads into memory upon boot up
File Infector Virus
file infector virus infects .com, or .exe files by overriding the original code. And it can easily affect another executable with the same extension
Companion Virus
A companion virus disguises itself as a legitimate file, it takes on a legitimate file name, but it uses a different extension with a higher priority to the processor. So for example, you might have a file on your system called good.exe, the companion virus will name itself good.com, which is a higher priority to the processor.
Macro Virus
The macro virus is written in a macro language and it’s platform-independent. It infects and replicates templates and documents
What is a worm?
a worm is malicious code that exploits known vulnerabilities. It is self replicating and it takes advantage of network features to spread
What type of Network Feature?
email and file sharing, instant messaging, even network packets
Internet Worm
internet worm is one that’s injected into a website and then re replicates itself onto any computer when that page is accessed and loaded.
Email-Worm
Email worms are distributed there via attachments and or embedded links
File sharing worms
known as P2P are distributed via a peer to peer transfer
Instant messaging worms
are distributed via messaging platforms and they’re disguised as attachments or links
network transport worms
hidden in network packets so they can spread and self propagate through shared access to any device, drive or file across the network, very dangerous.
What is a Trojan?
Trojan is malicious code that looks legitimate and it acts like a bona fide file or application. For example, a game, a video or music. So it’s just doing whatever you expected it to do, playing the video, playing the song, providing you with a game, but at the same time, it’s taking control, it’s delivering its payload
RAT
RAT stands for remote access Trojan, and its objective is to gain control of the system via a remote network connection. So you’re playing the game, but the attacker is actually making it connect to you
Backdoor Trojan
A backdoor is used to open a less obvious connection for later access. Again you’re playing that game and the backdoor Trojan opens up another channel.