Malware Attack Techniques Flashcards

(12 cards)

1
Q

What is a Malware Exploitation Technique?

A

Specific method by which malware code penetrates and infects a targeted system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Fileless Malware do?

A

Creates a process in the system memory without relying on the local file system of the infected host in order to avoid detection by signature-based security software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does this modern malware work?

A

When a user accidentally clicks on a malicious link or opens a malicious file, the specific type of malware being installed is known as a stage one dropper or downloader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Stage 1: Dropper or Downloader?

A

Piece of malware that is usually created as a lightweight shellcode that can be executed on a given system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Dropper?

A

Specific malware type designed to initiate or run other malware forms within a payload on an infected host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Downloader?

A

Retrieve additional tools post the initial infection facilitated by a dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary function for a stage 1 dropper or downloader?

A

To retrieve additional portions of the malware code and to trick the user into activating it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Shellcode?

A

Broader term that encompasses lightweight code meant to execute an exploit on a given target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Stage 2: Downloader?

A

Downloads and installs a remote access Trojan to conduct command and control on the victimized system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the “Actions on Objectives” phase?

A

Threat actors will execute primary objectives to meet core objectives like
■ data exfiltration
■ file encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Concealment?

A

Used to help the threat actor prolong unauthorized access to a system by
■ hiding tracks
■ erasing log files
■ hiding any evidence of malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “Living off the Land”?

A

■ A strategy adopted by many Advanced Persistent Threats and criminal organizations
■ The threat actors try to exploit the standard tools to perform intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly