07 CEH: Malware Threats

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which *netstat* flag displays active TCP connections and includes the process ID (PID) for each connection?

-o

What 2 things differentiate a *worm* from a *virus*?

1. A worm replicates on its own, instead of attaching to other programs 2. A worm spreads throughout the network, but a virus spreads throughout different aspects of a particular host

What are the 7 steps of *infecting systems using a trojan*?

1. Create a new Trojan packet 2. Employ a dropper or downloader to install the malicious code on the target system 3. Employ a wrapper to bind the Trojan to a legitimate file 4. Employ a crypter to encrypt the Trojan 5. Propagate the Trojan by various methods 6. Deploy the Trojan on the victim's machine by executing dropper or downloader on the target machine 7. Execute the damage routine

What are the 6 stages in the *virus lifecycle*?

1. Design 2. Replication 3. Launch 4. Detection 5. Incorporation 6. Execution of the damage routine

What are the 4 phases that *fileless malware attack*?

1. Point of Entry 2. Code Execution 3. Persistence 4. Achieving Objectives

What are the 6 phases in the *Advanced Persistent Threat (APT) Lifecycle*?

1. Preparation (define target, research target, organize team, build or attain tools, test for detection) 2. Initial Intrusion 3. Expansion 4. Persistence 5. Search and Exfiltration 6. Cleanup

What is DNSQuerySniffer?

A DNS resolution monitoring tool

What is DriverView?

A device driver monitoring tool

What is AntiVirus Pro 2017?

A fake antivirus program

What is Antivirus 10?

A fake antivirus program

What is PCSecureSystem?

A fake antivirus program

What is Netwrix Auditor?

A file and folder monitoring tool

What is PA File Sight?

A file and folder monitoring tool

What is Tripwire?

A file and folder monitoring tool

What is Capsa?

A network traffic monitoring / analysis tool

What is PEid?

A packing / obfuscation identification tool

What is TCPView?

A port monitoring tool

What is BitPaymer?

A ransomware family

What is CTB-Locker?

A ransomware family

What is Cerber?

A ransomware family

What is CryptXXX?

A ransomware family

What is Crypto Defense Ransomware?

A ransomware family

What is Crypto Locker Ransomware?

A ransomware family

What is Cryptobit Ransomware?

A ransomware family

What is Cryptowall Ransomware?

A ransomware family

What is Sodinokibi?

A ransomware family

What is jv16 PowerTools?

A registry monitoring tool

What is *Autoruns for Windows*?

A startup program monitoring tool

What is WinPatrol?

A startup program monitoring tool

What is BinText?

A string search tool

What is PE Explorer?

A tool for finding PE information about an executable

What is Godzilla?

A trojan downloader

What is Dridex?

A trojan dropper

What is Emotet?

A trojan dropper

What is Senna?

A trojan generator

What is Advanced File Joiner?

A trojan wrapper

What is Elite Wrap?

A trojan wrapper

What is IExpress Wizard?

A trojan wrapper

What is Bhavesh?

A virus maker

What is DELmE?

A virus maker

What is JPS?

A virus maker

What is Beapy?

A worm

What is Bondat?

A worm

What is Monero?

A worm

What is a type of network attack where an attacker gains unauthorized access to a target network from the outside and *remains undetected for a long period of time*?

Advanced Persistent Threat (APT)

What is API Monitor?

An API call monitoring tool

What is Angler?

An exploit kit

What is Magnitude?

An exploit kit

What is RIG?

An exploit kit

What is another word for *dynamic malware analysis*?

Behavioral analysis

What is the CVE number of the Windows VBScript engine remote code execution vulnerability?

CVE-2018-8174

What type of virus stores itself with the same filename as the target program file, infects the computer upon executing the file, and modifies hard-disk data?

Camouflage virus

What ransomware is delivered when an attacker uses the RIG exploit kit by taking advantage of outdated versions of applications such as Flash, Java, Silverlight, and Internet Explorer?

Cerber

What is another word for *static malware analysis*?

Code analysis

What virus detection method involves AV executing malware inside a virtual machine and analyzing its behavior to categorize it?

Code emulation method

What is software that protects malware from undergoing reverse engineering or analysis?

Crypter

In what stage of the virus lifecycle is the virus developed?

Design

In what stage of the virus lifecycle is the virus identified as a threat?

Detection

What is do you call exploiting flaws in browser software to install malware just by visiting a web page?

Drive-by download

In what stage of the virus lifecycle does the user update their AV solution, eliminating the virus?

Execution of the damage routine

At what phase in the APT lifecycle does the attacker obtain administrative access and/or spread malware to other systems within the environment?

Expansion

What is a platform to deliver exploits and payloads?

Exploit kit

What is the process of computing the hash value for a given binary?

File fingerprinting

What is Divergent?

Fileless malware

What is malware that infects legitimate software, applications, and other protocols existing in the system to achieve its goals?

Fileless malware / non-malware

What type of virus detection method is proficient at detecting new viruses from known virus strains?

Heuristic analysis

What is the fileless malware attack in which an attacker injects a malicious payload into the RAM that targets a legitimate process without leaving any footprints?

In-memory exploit

In what stage of the virus lifecycle is the virus's signature integrated into AV solutions?

Incorporation

At what phase in the APT lifecycle does the attacker send spear-phishing emails, perform social engineering, exploit vulnerabilities, and deploy malware?

Initial intrusion

What is a program that injects its code into other vulnerable running processes?

Injector

What is Mirekusoft Install Monitor?

Installation monitoring tool

What virus detection method involves integrity checking products that work by reading the entire disk and recording integrity data that act as a signature for the files and system sectors?

Integrity checking method

What virus detection method involves monitoring the operating system calls?

Interception method

In what stage of the virus lifecycle is the virus activated by particular user actions?

Launch

What is embedding malware in *ad-networks* that display across hundreds of legitimate, high-traffic sites?

Malvertising

What fileless technique is used by an attacker to exploit operating systems such as Windows that include pre-installed tools such as PowerShell and Windows Management Instrumentation?

Native applications

What is a program that conceals its code via various techniques?

Obfuscator

What is a program that allows all files to bundle together into a single executable file via compression to bypass security software detection?

Packer

At what phase in the APT lifecycle does the attacker create additional footholds within the target environment by creating services and installing applications in rarely-scanned locations?

Persistence

What type of virus is an enhanced encryption virus that uses a code engine to cipher itself as it replicates, constantly mutating its appearance while maintaining its original functionality?

Polymorphic virus

At what phase in the APT lifecycle does the attacker perform any preliminary configurations such as registering domains, hosting malware sites, creating malware, and configuring C2 servers?

Preparation

What is *black hat Search Engine Optimization (SEO)*?

Ranking malware pages highly in search results

What is Dharma?

Ransomware

What is eCh0raix?

Ransomware

In what stage of the virus lifecycle does the virus replicate itself within the target system?

Replication

What *protocol* does the WannaCry ransomware exploit during the attack on any Windows machine?

SMB

What ransomware adopts the RSA-2048 asymmetric encryption technique to encrypt local files in infected systems?

SamSam

What virus detection method involves looking through traffic for particular signatures?

Scanning method

What is a computer installed with port monitors, file monitors, network monitors, and antivirus software that only connects to a network under strictly controlled conditions for the purpose of analyzing malware?

Sheep dip computer

What type of virus infects only occasionally upon satisfying certain conditions or when the length of the file falls within a narrow range?

Sparse infector virus

What is the main objective of *Advanced Persistent Threats (APTs)*?

The main objective behind these attacks is to obtain sensitive information, rather than sabotaging the organization and its network

What type of virus transfers all controls of the host code to where it resides in the memory, selects the target program to be modified, and corrupts it?

Transient virus

What type of virus hides itself from antivirus programs by actively altering and corrupting service call interrupts while running?

Tunneling / stealth virus

What are the 3 types of *fileless malware*?

Type 1, Hardware: no file activity performed at all Type 2, Execution/Injection: No files written on disk, but some files used indirectly Type 3: Exploit: Files required to achieve fileless persistence

What is a *self-replicating* program that produces its own copy by attaching itself to another program, computer boot sector, or document?

Virus

What is a false alarm claiming reports about a non-existing virus that may contain virus attachments?

Virus hoax

What is the networking DLL that a Windows application will leverage to connect to a network or perform network-related tasks?

WSock32.dll

What is SrvMan?

Windows Service Manager is a tool for monitoring Windows services

By conducting what type of monitoring techniques can a security professional identify the presence of any malware that manipulates HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services registry keys to hide its processes?

Windows services monitoring

What is a malicious program that independently replicates, executes, and spreads *across the network*?

Worm


Ensembles d'études connexes

Princeton Review Exams: Psych/Sociology

View Set

IL Life - Provisions, Riders and Options combined sets

View Set

Focus on Vocabulary - Why are you happy?

View Set

NURS417 Ch10: Therapeutic Communication and Relationships

View Set

APES Unit 3 Quizlet Based on Resources

View Set