Malware Threats Flashcards

1
Q

What does the ‘Payload’ component of malware do?

A

The payload is the part of the malware that performs the desired activity when activated. It may be used for deleting or modifying files, degrading the system performance, opening ports, changing settings, etc., to compromise system security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the ‘Obfuscator’ component of malware do?

A

The obfuscator is a program that conceals the malicious code of malware via various techniques, thus making it difficult for security mechanisms to detect or remove it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the ‘Dropper’ component of malware do?

A

The dropper is a covert carrier of malware. Attackers embed notorious malware files inside droppers, which can perform the installation task covertly. Attackers need to first install the malware program or code on the system to execute the dropper. The dropper can transport malware code and execute the malware on a target system without being detected by antivirus scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the ‘Injector’ component of malware do?

A

The injector injects exploits or malicious code available in the malware into other vulnerable running processes and changes the method of execution to hide or prevent its removal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a crypter?

A

A crypter is a software program that can conceal the existence of malware. Attackers use this software to elude antivirus detection. It protects malware from reverse engineering or analysis, thus making it difficult to detect by security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a packer?

A

A packer is software that compresses the malware file to convert the code and data of the malware into an unreadable format. It uses compression techniques to pack the malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an overt channel?

A

An overt channel is a legal channel for the transfer of data or information in a company network and works securely to transfer data and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a covert channel?

A

Covert channels are methods attackers can use to hide data in an undetectable protocol. They rely on a technique called tunneling, which enables one protocol to transmit over the other. Any process or a bit of data can be a covert channel. This makes it an attractive mode of transmission for a Trojan because an attacker can use the covert channel to install a backdoor on the target machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an APT (Advanced Persistent Threat)?

A

An APT is an attack that focuses on stealing information from the victim machine without its user being aware of it. The impact of APT attacks on computer performance and Internet bandwidth is negligible as these attacks are slow in nature. APTs exploit vulnerabilities in the applications running on a computer, operating system, and embedded systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which port number is used by the trojans Zeus, OceanSalt, and Shamoon?

A

Port 8080

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which ports are used by the trojan Emotet?

A

Ports 20, 22, 80 and 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which port number is used by the trojan Senna Spy?

A

Port 11000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Emotet?

A

Emotet is a dropper/downloader for well-known banking Trojans such as Zeus Panda banker, Trickbot, and Iced ID to infect victims globally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is IExpress Wizard?

A

IExpress Wizard is a wrapper tool that guides the user to create a self-extracting package that can automatically install the embedded setup files, Trojans, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Godzilla?

A

Godzilla is a downloader that can be used for deploying malware on the target machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is BitCrypter?

A

BitCrypter is used to embed a crypter in binaries and can be used to encrypt and compress 32-bit executables and .NET apps without affecting their direct functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which port number is used by Trojans such as Silencer and WebEx?

A

1001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which port number is used by Trojans such as Psyber Stream Server and Voice?

A

1170

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which port number is used by the njRAT trojan?

A

1177

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which port number is used by the Doly trojan?

A

1011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which port number is used by trojans such as WannaCry, Petya, and Dragonfly 2.0?

A

445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which port numbers are used by the Hackers Paradise trojan?

A

31 and 456

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which port numbers are used by the TCP Wrappers trojan?

A

421

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which port number does the XtremeRAT use?

A

1863

25
Q

Which CVE is the Windows VBScript vuln?

CVE-2018-4878
CVE-2013-2465
CVE-2018-8174
CVE-2013-2551

A

CVE-2018-8174

26
Q

What is Replication in the virus lifecycle?

A

The virus replicates for a period within the target system and then spreads itself.

27
Q

What is Launch in the virus lifecycle?

A

The virus is activated when the user performs specific actions such as running an infected program

28
Q

What is Detection in the virus lifecycle?

A

The virus is identified as a threat infecting the target system

29
Q

What is Execution of the damage routine in the virus lifecycle?

A

Users install antivirus updates and eliminate the virus threats

30
Q

What is a tunneling virus?

A

Tunneling viruses try to hide from antivirus programs by actively altering and corrupting the service call interrupts while running. The virus code replaces the requests to perform operations with respect to these service call interrupts. These viruses state false information to hide their presence from antivirus programs.

31
Q

What is a macro virus?

A

Macro viruses infect Microsoft Word or similar applications by automatically performing a sequence of actions after triggering an application. Most macro viruses are written using the macro language Visual Basic for Applications (VBA), and they infect templates or convert infected documents into template files while maintaining their appearance of common document files

32
Q

What is a system/boot sector virus?

A

System viruses generally target the system sectors, which include the master boot record (MBR) and the DOS boot record system sectors. An OS executes code in these areas while booting

33
Q

What is a file virus?

A

File viruses infect files executed or interpreted in the system, such as COM, EXE, SYS, OVL, OBJ, PRG, MNU, and BAT files. File viruses can be direct-action (non-resident) or memory-resident viruses

34
Q

What is a transient virus?

A

Transient viruses transfer all controls of the host code to where it resides in the memory. It selects the target program to be modified and corrupts it

35
Q

What is an add-on virus?

A

Add-on viruses append their code to the host code without making any changes to the latter or relocate the host code to insert their code at the beginning

36
Q

What is an armored virus?

A

Armored viruses are viruses that are designed to confuse or trick deployed antivirus systems to prevent them from detecting the actual source of the infection.

37
Q

What is a covert channel trojan?

A

A covert channel trojan creates an arbitrary data transfer channel in data streams authorized by the network access control system

38
Q

What is a metamorphic virus?

A

Metamorphic viruses are programmed such that they rewrite themselves completely each time they infect a new executable file. Metamorphic code reprograms itself. It is translated into temporary code (a new variant of the same virus but with different code) and then converted back into the original code. This technique, in which the original algorithm remains intact, is used to avoid pattern recognition by antivirus software.

39
Q

What is a polymorphic virus?

A

A polymorphic virus is a virus with a decrypting engine which decrypts the virus code before execution. During each infection, the mutation engine builds new virus code with completely different functionality. Then, the actual code and mutation engine both are encrypted for the next infection

40
Q

What does -s do when passed to netstat (Windows)?

A

-s causes netstat to show protocol statistics.

41
Q

What does -n do when passed to netstat (Windows)?

A

-n causes netstat to display active TCP connections; however, addresses and port numbers are expressed numerically, and no attempt is made to determine names

42
Q

What does -o do when passed to netstat (Windows)?

A

-o Displays active TCP connections and includes the process ID (PID) for each connection. You can find the application based on the PID in the Processes tab in Windows Task Manager

43
Q

What does -a do when passed to netstat (Windows)?

A

-a: Displays all active TCP connections and the TCP and UDP ports on which the computer is listening.

44
Q

What does Interception mean as it relates to antivirus products?

A

The interceptor monitors the operating system requests that are written to the disk.

45
Q

What does Code Emulation mean as it relates to antivirus products?

A

In code emulation techniques, the antivirus executes the malicious code inside a virtual machine to simulate CPU and memory activities. These techniques are considered very effective in dealing with encrypted and polymorphic viruses if the virtual machine mimics the real machine

46
Q

What does Heuristic Analysis mean as it relates to antivirus products?

A

Heuristic analysis can be static or dynamic. In static analysis, the antivirus analyses the file format and code structure to determine if the code is viral. In dynamic analysis, the antivirus performs a code emulation of the suspicious code to determine if the code is viral

47
Q

Which of the following Windows Service Manager (SrvMan) commands is used to install and start a legacy driver with a single call?

  • srvman.exe delete
  • srvman.exe run [service name] [/copy:yes] [/overwrite:no] [/stopafter:]
  • srvman.exe start [/nowait] [/delay:] / srvman.exe stop [/nowait] [/delay:] / srvman.exe restart [/delay:]
  • srvman.exe add [service name] [display name] [/type:] [/start:] [/interactive:no] [/overwrite:yes]
A

srvman.exe run [service name] [/copy:yes] [/overwrite:no] [/stopafter:]

48
Q

What is BinText?

A

BinText is a small text extractor utility that can extract text from any kind of file and includes the ability to find plain ASCII text, Unicode (double byte ANSI) text and Resource strings, providing useful information for each item in the optional “advanced” view mode.

49
Q

What is UPX?

A

UPX (Ultimate Packer for Executables) is a free and open source executable packer supporting a number of file formats from different operating systems.

50
Q

What is ASPack?

A

ASPack is an advanced EXE packer created to compress Win32 executable files and to protect them against non-professional reverse engineering.

51
Q

What is PE Explorer?

A

PE Explorer lets you open, view and edit a variety of different 32-bit Windows executable file types (also called PE files) ranging from the common, such as EXE, DLL and ActiveX Controls, to the less familiar types, such as SCR (Screensavers), CPL (Control Panel Applets), SYS, MSSTYLES, BPL, DPL and more (including executable files that run on MS Windows Mobile platform).

52
Q

What is kernel32.dll used for?

A

Kernel32.dll is used to access/manipulate memory, files, and hardware

53
Q

What is advapi32.dll used for?

A

Advapi32.dll is used to access/manipulate Service Manager and Registry

54
Q

What is User32.dll used for?

A

User32.dll is used to display and manipulate graphics

55
Q

What is Sheep Dipping?

A

Sheep dipping refers to the analysis of suspect files, incoming messages, etc. for malware. The users isolate the sheep-dipped computer from other computers on the network to block any malware from entering the system. Before performing this process, it is important to save all downloaded programs on external media such as CD-ROMs or DVDs. A computer used for sheep dipping should have tools such as port monitors, files monitors, network monitors, and one or more anti-virus programs for performing malware analysis of files, applications, incoming messages, external hardware devices (such as USB, Pen drive, etc.), and so on

56
Q

What is Droidsheep?

A

DroidSheep is a tool used for session hijacking on Android devices connected on common wireless network. It gets the session ID of active user on Wi-Fi network and uses it to access the website as an authorized user. The droidsheep user can easily see what the authorized user is doing or seeing on the website. It can also hijack the social account by obtaining the session ID.

57
Q

What is AlienVault USM Anywhere?

A

AlienVault® USM Anywhere™: AlienVault® USM Anywhere™ is a Fileless malware detection tool that provides a unified platform for threat detection, incident response, and compliance management. It centralizes security monitoring of networks and devices in the cloud, on premises, and at remote locations, thereby helping you to detect threats virtually anywhere.

58
Q

What is GFI LanGuard?

A

GFI LanGuard: The GFI LanGuard patch management software scans the user’s network automatically as well as installs and manages security and non-security patches