Malware Families Flashcards

1
Q

What is a Virus

A

a virus is a malicious code whose primary function is to replicate and to deliver its payload. And remember that we said, a virus requires a host to execute and replicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Boot Sector Virus

A

boot sector virus infects the boot or the first sector of a drive then loads into memory upon boot up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

File Infector Virus

A

file infector virus infects .com, or .exe files by overriding the original code. And it can easily affect another executable with the same extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Companion Virus

A

A companion virus disguises itself as a legitimate file, it takes on a legitimate file name, but it uses a different extension with a higher priority to the processor. So for example, you might have a file on your system called good.exe, the companion virus will name itself good.com, which is a higher priority to the processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Macro Virus

A

The macro virus is written in a macro language and it’s platform-independent. It infects and replicates templates and documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a worm?

A

a worm is malicious code that exploits known vulnerabilities. It is self replicating and it takes advantage of network features to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of Network Feature?

A

email and file sharing, instant messaging, even network packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internet Worm

A

internet worm is one that’s injected into a website and then re replicates itself onto any computer when that page is accessed and loaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Email-Worm

A

Email worms are distributed there via attachments and or embedded links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File sharing worms

A

known as P2P are distributed via a peer to peer transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Instant messaging worms

A

are distributed via messaging platforms and they’re disguised as attachments or links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

network transport worms

A

hidden in network packets so they can spread and self propagate through shared access to any device, drive or file across the network, very dangerous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Trojan?

A

Trojan is malicious code that looks legitimate and it acts like a bona fide file or application. For example, a game, a video or music. So it’s just doing whatever you expected it to do, playing the video, playing the song, providing you with a game, but at the same time, it’s taking control, it’s delivering its payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RAT

A

RAT stands for remote access Trojan, and its objective is to gain control of the system via a remote network connection. So you’re playing the game, but the attacker is actually making it connect to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Backdoor Trojan

A

A backdoor is used to open a less obvious connection for later access. Again you’re playing that game and the backdoor Trojan opens up another channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Downloader Trojan

A

Downloader targets an already infected computer to download additional or new versions of the malicious code

17
Q

Fake AV Trojan

A

fake AV well, it behaves like any virus software, but it demands payment to remove threats either real or fake

18
Q

What is a RootKit?

A

that’s designed to take privileged control of the device, access right to the kernel of the operating system or to the firmware, but really high level privilege control

19
Q

Components of a RootKit?

A

Dropper, loader, and rootkit itself, difficult to identify and remove

20
Q

Firmware

A

Firmware is going to be malicious code that gets embedded in the device firmware, and it can modify functionality

21
Q

Kernel

A

Kernel rootkit is designed to function at the level of the operating system itself, and it can add new code to the operating system or even delete and replace operating system code

22
Q

BootLoader

A

bootloader rootkit boots up at the same time as the operating system, by infecting the master boot record, the MBR, and it can modify or delete boot records

23
Q

Memory

A

memory rootkit hides in RAM and a by-product of it hiding a RAM is it reduces performance by occupying resources.

24
Q

Identify dangers of RootKits?

A

modify functionality, add new code to an operating system, delete boot records, or use up resources. It can also be persistent, stays active when the computer is turned on until it is turned off.

25
Q

What is Spyware?

A

Spyware is code that collects information without consent, and it might use that information for future interactions

26
Q

Keylogger spyware

A

capture your keystrokes and your mouse or pad movements

27
Q

Monitor Spyware

A

monitor is used for tracking user activity, what programs do you open? What files do you open? What do you print?

28
Q

Tracking cookies spyware

A

Tracking cookies are used to log web browsing activity

29
Q

Adware spyware?

A

adware is used for delivering targeted advertising based on that known user activity

30
Q

What is Programmatic Malware?

A

Programmatic is code that has been inserted or created by the application programmers, the coders or the publishers

31
Q

Backdoor Programmtic Malware

A

backdoor is code that’s designed to bypass access controls. In the development cycle very often backdoors are purposely created in case something goes wrong with the access control system

32
Q

logicBomb programmatic malware

A

logic bomb is code that’s designed to execute when a certain event occurs or at a certain period of time. And those are always inserted intentionally. So backdoors and logic bombs also known as a slag code.