Unit 6 - Malicious Software

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:24 PM on 4/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

55 Terms

1
New cards

What is malware?

Software that has been designed for some nefarious (malicious) purpose

2
New cards

What does the acronym MALWARE stand for?

MALicious softWARE

3
New cards

What are the two general reasons a computer system is attacked?

It is specifically targeted by an attacker, or it is a target of opportunity

4
New cards

What is a targeted attack?

An attack chosen based on the attacker's motivation, often for political reasons, and not reliant on the target's specific hardware/software

5
New cards

What is a target of opportunity attack?

An attack on systems that have hardware or software vulnerable to a specific exploit; less difficult and time-consuming than targeted attacks

6
New cards

What are three steps to minimize possible attacks?

Ensure all OS and application patches are installed, limit running services, and limit public disclosure of private information about your organization

7
New cards

Why is patching vulnerabilities important?

It closes the point of entry for most malware

8
New cards

What is ransomware?

A form of malware that performs some action and extracts a ransom from the user

9
New cards

What is a Trojan horse?

A piece of software that appears to do one thing but hides some other (malicious) functionality

10
New cards

What is a worm?

A piece of code that attempts to penetrate networks and computer systems

11
New cards

What is a virus?

A piece of malicious code that replicates by attaching itself to another piece of executable code

12
New cards

What are the three main types of viruses?

Boot sector virus, program virus, and macro virus

13
New cards

What is a boot sector virus?

A virus that infects the boot sector of a storage device

14
New cards

What is a program virus?

A virus that attaches itself to executable program files

15
New cards

What is a macro virus?

A virus that is embedded in a document macro and executes when the document is opened

16
New cards

What is fileless malware?

Malware that operates in memory without writing files to disk making it harder to detect

17
New cards

What is polymorphic malware?

Malware that constantly changes its identifiable featuresâ€"such as file names, encryption keys, or signaturesâ€"to evade detection by traditional signature-based antivirus tools

18
New cards

What is multipartite malware?

Malware that infects multiple parts of a system simultaneously, typically combining boot-sector and file-system infections by targeting both the MBR and executable files

19
New cards

What is a Potentially Unwanted Program (PUP)?

A designation used by security companies and antivirus vendors to identify programs that may have adverse effects on a computer's security or privacy

20
New cards

What is a botnet?

A collection of compromised machines (zombies) that have malware agents installed by hackers

21
New cards

What is a zombie in the context of botnets?

A machine that has had a malware agent installed by a hacker and is part of a botnet

22
New cards

What is crypto-malware?

Malware that uses a system's resources to mine cryptocurrency; considered a theft-of-services attack

23
New cards

What makes crypto-malware a theft-of-services attack?

The attacker uses the CPU cycles of someone else's computer to perform cryptocurrency mining

24
New cards

What is a logic bomb?

Malicious software that is deliberately installed (generally by an authorized user), which sits dormant until some triggering event invokes its malicious payload

25
New cards

What is spyware?

Software that spies on users, recording and reporting on their activities, typically installed without user knowledge

26
New cards

What is adware?

Software that is supported by advertising; can come in many different forms

27
New cards

What is a keylogger?

A piece of software that logs all the keystrokes a user enters

28
New cards

What two conditions make a keylogger malicious?

(1) Its operation is unknown to the user, and (2) it is not under the user's control

29
New cards

What is a Remote-Access Trojan (RAT)?

A toolkit designed to provide covert surveillance capability and/or unauthorized access to a target system; often mimics keyloggers and packet sniffers

30
New cards

What is a rootkit?

A form of malware specifically designed to modify the operation of the operating system to facilitate nonstandard functionality

31
New cards

What is a backdoor/trapdoor in the context of malware?

Programs that attackers install after gaining unauthorized access to a system to ensure continued unrestricted access, even if the initial access method is discovered and blocked

32
New cards

What are best practices for defending against malware?

Use an antivirus/anti-malware program, keep software up to date, and track all software and vendor updates across the enterprise

33
New cards

What is the primary purpose of the Strings tool in malware analysis?

To find human-readable strings in binary files that may include API names and DLL files

34
New cards

What types of information can strings in a binary reveal?

API/function names, DLL names, fully qualified domain names (FQDNs), and IP addresses

35
New cards

What does it mean when a binary is packed?

The binary is obfuscated/compressed to hide its strings from malware analysts

36
New cards

What are the two functions that a packed binary must at least have?

LoadLibraryA and GetProcAddress (to find functions in memory at runtime)

37
New cards

What is UPX?

Ultimate Packer for eXecutables and an open-source packer that can compress/obfuscate binaries across multiple file formats and operating systems

38
New cards

How do you unpack a UPX-compressed binary from the command line?

Use the command: upx -o -d

39
New cards

What does the -n option do in the Strings tool?

Specifies the minimum string length; e.g.

40
New cards

What does the -o option do in the Strings tool?

Displays the offset in the file where each string was located

41
New cards

What is PEview used for in malware analysis?

To examine the PE (Portable Executable) file structure and detect embedded binaries within a file

42
New cards

What does PE stand for in the context of Windows executables?

Portable Executable

43
New cards

What are common sections in the PE file format?

`.text` (code), `.rdata` (read-only global data/imports/exports), `.data` (global data), `.rsrc` (resources), `.reloc` (relocation info)

44
New cards

What is the .rsrc section in a PE file?

The section containing resources the binary needs; can also harbor embedded binaries

45
New cards

What is the MZ header?

The first two ASCII characters (MZ / hex 4D 5A) found at the start of a PE file; indicates it is a Windows executable

46
New cards

What tool is used to extract an embedded binary from a PE file's resources?

Resource Hacker

47
New cards

What is the significance of seeing an MZ header inside a .rsrc section in PEview?

It indicates that another PE (executable) file is embedded within the binary

48
New cards

What does an FQDN stand for and what is it?

Fully Qualified Domain Name and a complete domain name that specifies its exact location in the DNS hierarchy (e.g.

49
New cards

What is the significance of finding an FQDN or IP address in a binary's strings?

It may indicate the malware communicates with a remote server (e.g.

50
New cards

What does it mean to form a hypothesis during malware string analysis?

To make an educated guess about the malware's behavior and purpose based on visible strings before deeper analysis

51
New cards

What is the significance of very few meaningful strings in a binary?

It is highly indicative that the binary is packed or obfuscated

52
New cards

What are APIs in the context of malware analysis?

Application Programming Interfaces â€" functions provided by DLLs that binaries call to perform operations; visible strings can reveal malware behavior

53
New cards

What is a virus hoax?

A false warning spread about a nonexistent or exaggerated virus threat

54
New cards

What is the best general security practice to avoid virus infection?

Always be cautious about executing programs or opening documents sent to you

55
New cards

What does it mean when functions from ws2_32.dll are called by ordinal rather than name?

It is a form of obfuscation to hide the use of Winsock (network) functions from string analysis