Technical Intelligence Flashcards

(11 cards)

1
Q

What are common email indicators of compromise (IOCs)?

A

Sender’s email address, subject line, malicious attachments and links, X-forwarding IP address, X-originating IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why monitor X-forwarding IP addresses in emails?

A

They reveal the proxy address used to send the email, offering insight into attack infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why monitor X-originating IP addresses in emails?

A

They identify the original IP address of the sender, useful for tracing attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are common network indicators of compromise (IOCs)?

A

URLs, domain names, IP addresses, user-agent strings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are URLs useful as network IOCs?

A

They are often unique paths used by threat actors for command and control or malware delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why monitor domain names in network traffic?

A

They can be used for malware delivery and data exfiltration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are IP addresses considered short-lived IOCs?

A

Threat actors frequently change servers or use legitimate cloud IPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are common host-based indicators of compromise (IOCs)?

A

Filenames, file hashes, registry keys, DLLs, mutexes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are registry keys important host-based IOCs?

A

Malware modifies registry settings for persistence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are DLLs used by threat actors?

A

They replace system files to ensure malware execution during startup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a mutex and why is it used in malware?

A

A program object used to ensure only one instance of malware infects a host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly