0% found this document useful (0 votes)
3K views2 pages

Types and Analysis of Malware

Ransomware is a type of malware called crypto-malware. Malware generally refers to harmful programs that disrupt computers, collect sensitive information, or gain unauthorized access to computer systems. A rootkit is used by hackers to mask intrusions and obtain administrator permissions on a computer. A botnet is a network of infected systems controlled by a hacker to launch distributed denial-of-service attacks.

Uploaded by

Ankur Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3K views2 pages

Types and Analysis of Malware

Ransomware is a type of malware called crypto-malware. Malware generally refers to harmful programs that disrupt computers, collect sensitive information, or gain unauthorized access to computer systems. A rootkit is used by hackers to mask intrusions and obtain administrator permissions on a computer. A botnet is a network of infected systems controlled by a hacker to launch distributed denial-of-service attacks.

Uploaded by

Ankur Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Which of the following option is also called a crypto-malware?

Ransomware

Harmful programs utilized to disrupt computer operation, collect sensitive


information or get access to private computer systems are generally known as
___________.
All the options

A computer program comprising a malicious segment that connects itself to an


application program or other executable component is known as __________.
Virun

Type of malware that performs unwanted and harmful actions in disguise of a


legitimate program is known as _________.
Trojan

_______________ is used by a hacker, in order to mask intrusion and obtain


administrator permissions to a computer.
Rootkit

Malicious code activated by a specific event or when a particular condition is


met is known as __________.
Logic bomb

A type of Trojan installed through an exploit or an email attachment onto a PC


is known as _____________.
Downloader

In computer security, the component of the malware, which is responsible for


performing malicious action is referred to as ___________.
Payload

Adware tracks browsing habits to provide better-targeted ads based on users'


interests.
True

A network of infected systems under the control of a hacker, whose intention is


to damage other computer networks by making them unavailable is called
__________.
(Flash cookie (Trojan

Which of the following types of files are supported by IDA Pro?


.exe

Pick the right hashing algorithm from the following options.


MD5

Pick the right hashing algorithm from the following options.


Treu

Which one of the following option is a debugging tool?


WinDbg

Wireshark can be used to steal sensitive information over a network.


True

Registry activity can be monitored with the help of ____________.


Regshot

Disassembler is used to convert machine language instructions to assembly


language.

This study source was downloaded by 100000797727937 from [Link] on 04-01-2023 [Link] GMT -05:00

[Link]
True

Which one of the options is a Windows Hashing Tool?


md5deep

We can detect compilers used for building an exe using _________.


PEiD

Data files containing detection and/or remediation code that antivirus or


antispyware products use to identify malware is known as ___________.
Signature files

Which of the following tools fully supports the idea of breakpoints?


Debugger

Which of the following is an example of spyware?


Keylogger

A collection of computers infected with malicious tool/software under control of


a hacker is called _________.
Botnet

Time Stamp of a file can be viewed with the help of PEview.


True

This study source was downloaded by 100000797727937 from [Link] on 04-01-2023 [Link] GMT -05:00

[Link]
Powered by TCPDF ([Link])

Common questions

Powered by AI

Wireshark is a powerful network protocol analyzer that can capture and scrutinize data packets flowing over a network, allowing users to observe all active communications. While it is an essential tool for diagnosing network issues and analyzing network traffic in a legitimate security research context, its ability to intercept and access sensitive data poses significant security risks if misused. The unauthorized use of Wireshark can lead to data breaches or the theft of confidential information, making it a double-edged sword in terms of network security .

Adware is typically designed to track a user's browsing habits to serve targeted advertisements, while spyware is more intrusive, collecting sensitive personal information without the user's consent. Adware can be a legitimate business tool when consented to by users, though it may still negatively impact performance by consuming resources. In contrast, spyware is purely malicious, often leading to privacy breaches and data theft without the user being aware of its presence .

Signature files are data files used by antivirus or antispyware products to identify malware. They contain detection and remediation code specifically tailored to recognize known malware by matching bit patterns unique to each threat. However, their limitation lies in their inability to detect new or unknown malware, for which no signatures have yet been created. This requires them to be frequently updated to remain effective against the latest threats .

A rootkit is a type of malware designed to gain unauthorized root or administrator-level access to a computer while hiding its presence and activity from users and security programs. Unlike other malware that may visibly disrupt system operation or steal data, a rootkit aims to maintain stealth by intercepting system calls or altering the operating system's functioning to conceal itself and other malicious processes it installs. This allows a hacker to maintain long-term control over the affected system without being detected .

A botnet is a network of infected computers, referred to as bots, that are controlled remotely by a hacker to perform coordinated attacks, such as distributed denial-of-service (DDoS) attacks, spamming, or click fraud. Unlike other malware, which might only impact individual systems, a botnet's structure allows it to harness the collective computing power of numerous machines, making it more scalable and capable of executing large-scale cyber operations. Its purpose is generally more aligned with criminal enterprises seeking to disrupt or monetize activities through coordinated actions .

PEiD is a tool that can be used to detect the compiler that was used to build an executable file by examining and identifying signatures of known compilers within the file. This information is valuable in malware analysis because it can provide insights into the techniques and likely origin of the malware author, helping attribute the malware to certain hacking groups known for using specific development tools or methods .

A hacker uses a downloader Trojan to facilitate the installation of additional malicious software onto a target computer. It typically gets introduced into a system through an exploit or as an email attachment, disguised as a legitimate file or program. Once activated, it can download and execute more complex or damaging malware from online sources, compounding the initial breach .

MD5 is a widely used hashing algorithm in malware analysis for verifying the integrity of data and identifying unique files through hash values. Its advantages include providing a quick method to check if a file has been altered or to ensure its authenticity and uniqueness. However, the disadvantages stem from its susceptibility to collisions, whereby two different files may produce the same hash, potentially leading to incorrect assumptions about file integrity or uniqueness. As a result, it is considered insecure for cryptographic purposes and less reliable for detecting sophisticated alterations in files .

The payload is a component of malware that is responsible for performing the malicious action on a computer system. It is usually delivered after the malware has successfully breached the system's security defenses and can include actions such as data theft, encryption for ransomware, or initiating a denial-of-service attack. The payload typically activates after the malware reaches its target environment, often due to a trigger or command from an external source or upon meeting specific criteria set by the malware creator .

A debugger is a tool used in malware analysis to examine and understand the behavior of a program by allowing the analyst to observe its execution in a controlled environment. It supports the concept of breakpoints, which can pause program execution at certain points to inspect variables, memory, and processor state. This helps in identifying malicious actions and understanding the logic and flow of the malware without executing it in an uncontrolled environment .

You might also like