Malware Flashcards

1
Q

Computer Virus

A

Made up of malicious code that’s run on a machine without the user’s
knowledge and this allows the code to infect the computer whenever it has been
run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Boot Sector virus

A

Is stored in the first sector of a hard drive and is then loaded
into memory whenever the computer boots up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Macro virus

A

Form of code that allows a virus to be embedded inside another
document so that when that document is opened by the user, the virus is
executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Program virus

A

Try to find executables or application files to infect with their malicious
code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multipartite virus

A

Combination of a boot sector type virus and a program virus
Able to place itself in the boot sector and be loaded every time the
computer boots
It can install itself in a program where it can be run every time the
computer starts up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encrypted virus

A

Designed to hide itself from being detected by encrypting its malicious
code or payloads to avoid detection by any antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Polymorphic virus

A

Advanced version of an encrypted virus, but instead of just encrypting the
contents it will actually change the viruses code each time it is executed
by altering the decryption module in order for it to evade detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Metamorphic virus

A

Able to rewrite themselves entirely before it attempts to infect a given file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Stealth

A

Technique used to prevent the virus from being detected by the anti-virus
software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Armored virus

A

Have a layer of protection to confuse a program or a person who’s trying
to analyze it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worm

A

Piece of malicious software, much like a virus, but it can replicate itself without
any user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan

A

Piece of malicious software that is disguised as a piece of harmless or desirable
software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RAT

A

Remote Access Trojan

Provides the attacker with remote
control of a victim machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

Type of malicious software that is designed to block access to a computer system
or its data by encrypting it until a ransom is paid to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Botnet

A

Network of compromised computers or devices controlled remotely by malicious
actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zombie

A

Name of a compromised computer or device that is part of a botnet

Used to perform tasks using remote commands from the attacker without the
user’s knowledge

17
Q

C&C Node

A

Command and Control Node

Computer responsible for managing and coordinating the activities of other
nodes or devices within a network

18
Q

DDoS

A

Distributed Denial of Service

Occurs when many machines target a single victim and attack them at the
exact same time

19
Q

DoS

A

Denial of Service

20
Q

Rootkit

A

Designed to gain administrative level control over a given computer system
without being detected

21
Q

DLL

A

Dynamic Link Library

Collection of code and data that can be used by multiple programs
simultaneously to allow for code reuse and modularization in software
development

22
Q

DLL Injection

A

Technique used to run arbitrary code within the address space of another
process by forcing it to load a dynamic-link library

23
Q

Shim

A

Piece of software code that is placed between two components and that
intercepts the calls between those components and can be used redirect
them

24
Q

Backdoor

A

Originally placed in computer programs to bypass the normal security and
authentication functions

Most often put into systems by designers and programmers

25
Easter egg
a hidden feature or novelty within a program that is typically inserted by the software developers as an inside joke Code often has significant vulnerabilities
26
Logic Bombs
Malicious code that's inserted into a program, and the malicious code will only execute when certain conditions have been met
27
Keylogger
Piece of software or hardware that records every single keystroke that is made on a computer or mobile device
28
Spyware
Malicious software that is designed to gather and send information about a user or organization without their knowledge
29
Bloatware
Any software that comes pre-installed on a new computer or smartphone that you, as the user, did not specifically request, want, or need
30
Fileless Malware
Used to create a process in the system memory without relying on the local file system of the infected host
31
Stage 1 Dropper or Downloader
Piece of malware that is usually created as a lightweight shellcode that can be executed on a given system
32
Dropper
Specific malware type designed to initiate or run other malware forms within a payload on an infected host
33
Downloader
Retrieve additional tools post the initial infection facilitated by a dropper
34
Shellcode
Broader term that encompasses lightweight code meant to execute an exploit on a given target
35
Living off the Land
A strategy adopted by many Advanced Persistent Threats and criminal organizations the threat actors try to exploit the standard tools to perform intrusions
36
IOC
Indicator of Compromise
37
Common indicators of compromise
1. Account Lockouts 2. Concurrent Session Utilization 3. Blocked Content 4. Impossible Travel 5. Resource consumption 6. Resource inaccessibility 7. Out-of-cycle Logging 8. Missing Logs 9. Published or Documented Attacks