Malware Forensics Flashcards

1
Q

Crypter

A

a software program that can conceal existence of malware. Attackers use this software to elude antivirus detection. The crypter encrypts the malicious file to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Downloader

A

type of Trojan that downloads other malware (or) malicious code from the Internet onto the PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dropper

A

can contain unidentifiable malware code that antivirus scanners cannot detect and is capable of downloading additional files needed to execute the malware on a target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exploit

A

it is the code the attackers use to breach the system’s security through software vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Injector

A

program that injects the exploits or malicious code available in the malware into other vulnerable running processes and changes execution to hide or prevent its removal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Obfuscator

A

a program to conceal the malicious code of a malware via various techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Packer

A

software that compresses the malware file to convert the code and data of malware into an unreadable format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Payload

A

part of the malware that performs the desired activity when activated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Static Analysis

A

Static analysis is a basic analysis of the binary code and comprehension of the malware that explains its functions, without executing the code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Behavioral analysis or dynamic analysis

A

deals with the study of malware behavior during installation, on execution and while running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Static Malware Analysis technique

A

Techniques include:
File fingerprinting
Local and Online malware scanning Performing strings search
Identifying packing/obfuscation methods
Finding the portable executables (PE) information Identifying file dependencies Malware disassembly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly