Malware Flashcards

(37 cards)

1
Q

Malware is….

A

Any software that has been created to damage, disable, or produce an unwanted condition within a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A virus is…

A

Intentionally malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Self-replicating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan

A

Malware hidden in legitimate files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RAT

A

Remote access trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Keylogger

A

Logs keystrokes and sends to a controller for credential theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rootkit

A

Parts of or the entire bootloader has changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What defeats rootkits?

A

Secure boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firmware Rootkit

A

Operates lower than a bootloader. Overwrites the firmware of the BIOS so that the malware is persisted before the bootloader starts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Kernel Rootkit

A

Malicious drivers/kernel modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application rootkit

A

Modification of regular files to hide malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Memory rootkit

A

FIleless process running in memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backdoor

A

Persistent control of a system by offering recurring access to an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware.\

A

Encrypts a victims files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

File wipers

A

Destructive malware that destroys or corrupts files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who are you defending against in malware?

A

A human adversary, not a piece of software.

17
Q

What was the first worm to garner public attention?

A

The morris worm

18
Q

When was the morris worm created?

19
Q

Who created the morris worm?

A

Robert Tappan Morris

20
Q

What was Morris charged with?

A

Computer Fraud and Abuse Act.

21
Q

Stuxnet.

A

The first digital weapon, used to target an Iranian nuclear facility in 2010

22
Q

WannaCry

A

Widespread ransomware worm in 2017

23
Q

NotPetya

A

Ransomware by Russian military against Ukraine in 2017

24
Q

What are the two types of ransomware encryption techniques?

A

Hard coded keys - key is easily discoverable.
Client generated keys - Still easily discoverable, but key is not reusable to decrypt all infections.
Key -> server - Generate key during infection, and send to server for storage. Hard to discover.
Bake public key into ransomware & store private on server
Bake public key into the client & don’t store any keys (send to server
Use a hybrid - best of all worlds

25
Two ways to analyze malware
Static analysis - the file Dynamic Analysis - behavior
26
What is fingerprinting?
Obtaining a hash of the malicious binary
27
What is string extraction?
Look for malicious strings (IP, URL, etc.)
28
What is Packer Analysis
Looking for packed files that are hidden in other files
29
What is disassembly/decompilation?
Analyzing the files manually to look for malicious code.
30
YARA Rules
Schema to classify malware through text-based rules.
31
Machine Learning for malware analysis
Corpus - the set of malware trained.
32
Defined Point Analysis (Dynamic)
Malware is executed on a system with a known state.
33
Runtime behavior analysis (Dynamic)
Observe the behavior directly in a sandboxed environment.
34
What does modern malware do to manage its keys?
Generates a client key and uses a hardcoded server public key. This is known as the hybrid method.
35
What time of malware is used for cryptomining and DDoS attacks?
Botnets
36
When statically analyzing malware using machine learning, was must be done to the malware file before the ML model makes a decision?
FX
37
What malware was the first digital weapon?
Stuxnet