Malware Flashcards

1
Q

Computer Virus

A

Made up of malicious code that’s run on a machine without the user’s
knowledge and this allows the code to infect the computer whenever it has been
run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Boot Sector virus

A

Is stored in the first sector of a hard drive and is then loaded
into memory whenever the computer boots up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Macro virus

A

Form of code that allows a virus to be embedded inside another
document so that when that document is opened by the user, the virus is
executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Program virus

A

Try to find executables or application files to infect with their malicious
code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multipartite virus

A

Combination of a boot sector type virus and a program virus
Able to place itself in the boot sector and be loaded every time the
computer boots
It can install itself in a program where it can be run every time the
computer starts up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encrypted virus

A

Designed to hide itself from being detected by encrypting its malicious
code or payloads to avoid detection by any antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Polymorphic virus

A

Advanced version of an encrypted virus, but instead of just encrypting the
contents it will actually change the viruses code each time it is executed
by altering the decryption module in order for it to evade detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Metamorphic virus

A

Able to rewrite themselves entirely before it attempts to infect a given file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Stealth

A

Technique used to prevent the virus from being detected by the anti-virus
software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Armored virus

A

Have a layer of protection to confuse a program or a person who’s trying
to analyze it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worm

A

Piece of malicious software, much like a virus, but it can replicate itself without
any user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan

A

Piece of malicious software that is disguised as a piece of harmless or desirable
software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RAT

A

Remote Access Trojan

Provides the attacker with remote
control of a victim machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

Type of malicious software that is designed to block access to a computer system
or its data by encrypting it until a ransom is paid to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Botnet

A

Network of compromised computers or devices controlled remotely by malicious
actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zombie

A

Name of a compromised computer or device that is part of a botnet

Used to perform tasks using remote commands from the attacker without the
user’s knowledge

17
Q

C&C Node

A

Command and Control Node

Computer responsible for managing and coordinating the activities of other
nodes or devices within a network

18
Q

DDoS

A

Distributed Denial of Service

Occurs when many machines target a single victim and attack them at the
exact same time

19
Q

DoS

A

Denial of Service

20
Q

Rootkit

A

Designed to gain administrative level control over a given computer system
without being detected

21
Q

DLL

A

Dynamic Link Library

Collection of code and data that can be used by multiple programs
simultaneously to allow for code reuse and modularization in software
development

22
Q

DLL Injection

A

Technique used to run arbitrary code within the address space of another
process by forcing it to load a dynamic-link library

23
Q

Shim

A

Piece of software code that is placed between two components and that
intercepts the calls between those components and can be used redirect
them

24
Q

Backdoor

A

Originally placed in computer programs to bypass the normal security and
authentication functions

Most often put into systems by designers and programmers

25
Q

Easter egg

A

a hidden feature or novelty within a program that is typically inserted by the
software developers as an inside joke

Code often has significant vulnerabilities

26
Q

Logic Bombs

A

Malicious code that’s inserted into a program, and the malicious code will only
execute when certain conditions have been met

27
Q

Keylogger

A

Piece of software or hardware that records every single keystroke that is made
on a computer or mobile device

28
Q

Spyware

A

Malicious software that is designed to gather and send information about a user
or organization without their knowledge

29
Q

Bloatware

A

Any software that comes pre-installed on a new computer or smartphone that
you, as the user, did not specifically request, want, or need

30
Q

Fileless Malware

A

Used to create a process in the system memory without
relying on the local file system of the infected host

31
Q

Stage 1 Dropper or Downloader

A

Piece of malware that is usually created as a lightweight shellcode
that can be executed on a given system

32
Q

Dropper

A

Specific malware type designed to initiate or run other malware
forms within a payload on an infected host

33
Q

Downloader

A

Retrieve additional tools post the initial infection facilitated by a
dropper

34
Q

Shellcode

A

Broader term that encompasses lightweight code meant to
execute an exploit on a given target

35
Q

Living off the Land

A

A strategy adopted by many Advanced Persistent Threats
and criminal organizations

the threat actors try to exploit the standard tools to
perform intrusions

36
Q

IOC

A

Indicator of Compromise

37
Q

Common indicators of compromise

A
  1. Account Lockouts
  2. Concurrent Session Utilization
  3. Blocked Content
  4. Impossible Travel
  5. Resource consumption
  6. Resource inaccessibility
  7. Out-of-cycle Logging
  8. Missing Logs
  9. Published or Documented Attacks