Section F0 Introduction to Malware Analysis Flashcards

1
Q

Goals of malware analysis

A
1 determine if file is malicious
2 extract indicators of compromise
3 create host based signatures
4 create network signatures
5 determine capabilities of malicious code
6 update existing signatures if required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Indicators of compromise

A
File hashes (e.g. MD5)
•
Fuzzy hashes (e.g. SSDeep
•
Filenames and folder locations
•
Registry keys
•
Strings
•
IP addresses
•
Domains and URLs
•
Network traffic patterns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Systems that can use the IOC data

A
Anti virus (AV) signatures
•
Intrusion Detection System (IDS) signatures (e.g. Snort and Suricata)
•
File hash databases
•
Fuzzy hash databases
•
YARA signatures
•
Host Intrusion Detection System (HIDS) signatures
•
Security Information and Event Management (SIEM) signatures
Network firewalls
•
Network IDS/IPS
•
Anti virus
•
Host IDS
•
Web proxies
•
Email filters
•
SIEM logs
•
Forensic tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OPSEC is a five

step iterative process

A
Identification of Critical information
•
Analysis of Threats
•
Analysis of Vulnerabilities
•
Assessment of Risk
•
Application of Appropriate OPSEC Measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OPSEC don’ts

A

do not allow malware to connect back to the attacker
do not attempt to manually connect to attacker infrastructure
do not perfom port or vulnerability scans on attacker infrastructure
do not use discovered credentials (FTP username/passwords) to access services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OPSEC do’s

A
  • neuter bad file extensions (bad.exe to bad.exe_)
  • password protect zip files containing malware with password ‘infected’
  • label portable media containing malicious code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly