What is a Malware Exploitation Technique?
Specific method by which malware code penetrates and infects a targeted system
What does Fileless Malware do?
Creates a process in the system memory without relying on the local file system of the infected host in order to avoid detection by signature-based security software
How does this modern malware work?
When a user accidentally clicks on a malicious link or opens a malicious file, the specific type of malware being installed is known as a stage one dropper or downloader
What is Stage 1: Dropper or Downloader?
Piece of malware that is usually created as a lightweight shellcode that can be executed on a given system
What is a Dropper?
Specific malware type designed to initiate or run other malware forms within a payload on an infected host
What is a Downloader?
Retrieve additional tools post the initial infection facilitated by a dropper
What is the primary function for a stage 1 dropper or downloader?
To retrieve additional portions of the malware code and to trick the user into activating it
What is Shellcode?
Broader term that encompasses lightweight code meant to execute an exploit on a given target
What is Stage 2: Downloader?
Downloads and installs a remote access Trojan to conduct command and control on the victimized system
What is the “Actions on Objectives” phase?
Threat actors will execute primary objectives to meet core objectives like
■ data exfiltration
■ file encryption
What is Concealment?
Used to help the threat actor prolong unauthorized access to a system by
■ hiding tracks
■ erasing log files
■ hiding any evidence of malicious activity
What is “Living off the Land”?
■ A strategy adopted by many Advanced Persistent Threats and criminal organizations
■ The threat actors try to exploit the standard tools to perform intrusions