Malware Interview Questions Flashcards

(5 cards)

1
Q

What are the steps for custom malware development?

A

Environmental keying, sandbox evasion design, and custom encryption stub implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you categorize modern offensive tooling?

A

Into Stagers (payload loaders), Beacons (C2 agents), and specialized Post-Exploitation modules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the Malware Development Lifecycle.

A

Reconnaissance of target EDR, language selection, obfuscation, and offline QA testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why choose specific languages for malware?

A

C/C++ for low-level system calls; Nim/Rust to evade legacy signatures; C# for rapid AD interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you defend against custom red team tooling?

A

Using WDAC for application control, memory forensics for unbacked code, and canary tokens for early detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly