Malware Forensics Flashcards
Crypter
a software program that can conceal existence of malware. Attackers use this software to elude antivirus detection. The crypter encrypts the malicious file to avoid detection.
Downloader
type of Trojan that downloads other malware (or) malicious code from the Internet onto the PC.
Dropper
can contain unidentifiable malware code that antivirus scanners cannot detect and is capable of downloading additional files needed to execute the malware on a target system.
Exploit
it is the code the attackers use to breach the system’s security through software vulnerabilities.
Injector
program that injects the exploits or malicious code available in the malware into other vulnerable running processes and changes execution to hide or prevent its removal.
Obfuscator
a program to conceal the malicious code of a malware via various techniques.
Packer
software that compresses the malware file to convert the code and data of malware into an unreadable format.
Payload
part of the malware that performs the desired activity when activated.
Static Analysis
Static analysis is a basic analysis of the binary code and comprehension of the malware that explains its functions, without executing the code.
Behavioral analysis or dynamic analysis
deals with the study of malware behavior during installation, on execution and while running.
Static Malware Analysis technique
Techniques include:
File fingerprinting
Local and Online malware scanning Performing strings search
Identifying packing/obfuscation methods
Finding the portable executables (PE) information Identifying file dependencies Malware disassembly