Section 4.1: Malware Discovery Flashcards

1
Q

Name the four tools used to detect anomalies inside a system.

A

Yara, Sigcheck, Capa, and DensityScout.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe how to use Yara and how can I create rules.

A

Yara runs by running [-C] followed by the rules file and then <file> where the rules file will run on. If running multiple signature files, they must be referenced by index to the same file being run. To compile a new rule, use yara64.exe.</file>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is DensityScout and what does it do? Is output always malicious?

A

It scans a filesystem for compressed, encrypted, or packed files and tracks their entropy. Density that is less than 0.1 means its high on density making it an anomaly. Output isn’t always malicious so check the hashes for each file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Command example for searching executables with high density:

A

Densityscout -pe -r -p -o results.txt C:\Windows\System32.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Sigcheck used for?

A

To check if images are digitally signed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does capa do?

A

It disassembles the binary code in search for well-known patterns. It can be used to reverse-engineer and the rules are written in YAML. It can connect to ATT&CK. It can also use malfind files from memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A simple capa command.

A

Capa.exe -f pe <file></file>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly