Module 07: Malware Threats Flashcards
Malware
Malicious software that damages or disables computer systems and gives limited or full control of the systems to the malware creator for the purpose of theft or fraud.
How It Works: Malware is often distributed via infected files, email attachments, or malicious links.
Common Tools: Metasploit, Cobalt Strike, and custom scripts.
Viruses
Malware that attaches itself to files or programs and spreads when infected files are executed.
Worms
Autonomous malware that self-replicates and spreads on its own across networks without needing host files.
APT
Advanced Persistent Threat, a long-term, stealthy attack campaign, usually by a group, aimed at stealing data or gaining ongoing access to a network.
How It Works: APTs often use multiple stages—initial infiltration, lateral movement, and persistence—while evading detection.
Common Tools: Cobalt Strike, Mimikatz, and custom malware tailored for persistence.
Trojans
Malware disguised as legitimate software that, once executed, provides unauthorized access or control to an attacker.
How It Works: Users unknowingly download and run trojans, which may install backdoors or steal data.
Common Tools: Remote Access Trojans (RATs) like NanoCore, njRAT, Beast proejct, and DarkComet.
Fileless malware
Malware that doesn’t write files to disk, instead running in memory to avoid detection by traditional antivirus software.
How It Works: Often exploits legitimate processes (like PowerShell or WMI) to execute code directly in RAM.
Common Tools: PowerShell Empire, Cobalt Strike, and techniques like Living Off the Land (LOLBins).
Crypters
A tool used to encrypt malware code to evade detection by antivirus software, often by altering the code’s appearance without changing its function. Secures and hides code.
Downloader
A small piece of malware that connects to a remote server to download additional malicious components or updates once the initial infection is successful.
Dropper
A type of malware that installs and deploys other malicious files onto the infected system, often used to deliver trojans or ransomware.
Exploit
Code that takes advantage of a specific vulnerability in software or the OS to gain unauthorized access or escalate privileges.
Injector
Injects malicious code into legitimate processes running on the system, allowing the malware to hide within trusted applications and evade detection.
Obfuscator
Alters the malware’s code to make it harder to analyze, often by renaming functions or adding confusing, unused code sequences.
Packer
Compresses and encrypts malware into a single executable to avoid detection, only unpacking itself in memory when executed.
Payload
The part of malware that performs the malicious activity, such as stealing data, encrypting files, or controlling the infected system.
Malicious code
Any code within the malware designed to harm, steal, or control, encompassing everything from payloads to self-replication functions.