1) Threat Landscape, Malware Types, Lab Setup & Static Analysis Flashcards

1
Q

What are the three core categories of hackers? State the difference in motivation, and also state the target group most likely to be affected by their actions.

A
  • *Hacktivist**: Politicaly / Idealogy motivated; Big companies / Government / Big media coverage; Examples=Anonymous/LulzSec/Sony hack.
  • *Cybercriminals**: Hacks for money; Companies / Home Users; Examples=Ransomware/FakeAV/BankTrojans.
  • *Nation State**: Espionage/Sabotage/Political; Gov/Big Companies/Core Infrastructure; Examples=Stuxnet/APT attacks/Regin.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is CyberWar and what is CyberEspionage?

A

CyberWar: Attacks against core infrastructure, very short attack duration.
CyberEspionage: Uses hacking attacks to gain knowledge. Attack can take several months.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does the Future Cybercrime Landscape looks like?

A

IoT malware, Crypto malware, Mininig malware, CyberWarfare, APT attacks, Public Opinion Manipulation, DDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are DDOS attacks?

A

Distributed Denial of Service attacks. A lot of infected hosts (botnet) send request at the same time to the same target. The goal is to massivly flood the target in a way, that it can not response anymore. Service of target will be unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain Trojans

A

Malware that allows an attacker to remotely access the infected systems and/or send tasks. Trojans are normally disguised itself as a regular user program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain Backdoors

A

Is a type of malware that opens a gate for attackers to access the infected system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain RAT

A

Malware that allows an attacker to remotely access the infected systems and/or send tasks. Trojans are normally disguised itself as a regular user program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Computer Worms

A

Self-contained programs that are able to spread functional copies of itself to other computer systems across a network, normally via Email or other methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain Downloaders

A

Malware that downloads the actually payload after it gets executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain Droppers

A

Extract malware from own code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Botnets

A

Multiple infected systems that can be controlled by the bot owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain Spyware

A

Malware that collects sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain Adware

A

Makes money from serving ads. Often tracks user behaviour.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain FakeAV

A

Fake anti-virus that cleans systems for money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain Rootkits/Bootkits

A

Two types (user mode/kernel mode). Malware that hides itself from the OS. Compromisation is not clearly visible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain File Infector Virus

A

Copies malicious code into excecutable files like COM, BAT, CMD

17
Q

Explain Ransomware

A

Trojan malware that encrypts documents on the victims machine, or otherwise threatens the user in an attempt to extort money via blackmail.

18
Q

Explain Cryptojacking malware

A

Steals crypto wallets

19
Q

Explain Cryptomining malware

A

Steals CPU power to mine crypto currencies

20
Q

Explain Modular / Blended Threat

A

A mixture whereby different components of the malware fall into different categories, all working together

21
Q

What does a malware lab needs to be?

A

Easy to setup, easy to maintain, easy to restore, isolated, easy to monitor, equipped with correct analysis tools

22
Q

What are the five W’s of malware analysis?

A

WHY, WHEN, WHAT, WHO, WHERE

23
Q

Describe the main steps, in order, for extracting malware from an infected machine. For each stage simply give a 1-2 line description of what is carried out.

A
  • Run AV, Search for rootkits => GMER or Rootkit Buster
  • Run Loki for IOC
  • Run YARA
  • Look for suspicious processes
  • Look for suspicious network connections
  • Look for system startup procedures
  • Run ATTK tool
24
Q

What is Blackboxing? What W’s are covered?

A

Find as much out as possible about malware by executing the malware and run monitoring tools. WHAT, WHERE, WHEN

25
What is Whiteboxing? What W's are covered?
Reverse engineer code of malware. WHO, WHY
26
What are the main stages of malware analysis?
* 0 - Extracing malware * 1 - Static Analysis * 2 - Blackboxing * 3 - Internet Search * 4 - Whiteboxing * 5 - Result Presentation
27
What are the five main ways to get infected?
* Network, * email * IM * data transfer via USB * Internet surfing
28
What are symptoms of infection?
Slow system, disk usage, CPU power, network activity
29
What is the payload?
Payload is the name of the code that contains the malware.
30
What is the first step before extracting malware?
Create an image of HDD
31
What are the two key behaviours of modern malware
Networking, Survival of reboot