Malware Study Guide
Study Guide
📖 Core Concepts
Malware – software created to disrupt, steal, or gain unauthorized access to computers, networks, or data.
Classification – major families: Virus, Worm, Trojan Horse, Ransomware, Rootkit, Backdoor, Spyware/Adware (Grayware/PUP), Fileless.
Goodware / Grayware / Malware – spectrum of intent: goodware (benign), grayware (unwanted but not clearly malicious), malware (destructive/unauthorized).
Static vs. Dynamic Analysis – static = inspect code/signatures without execution; dynamic = run in a sandbox to watch behavior.
Evasion Techniques – encryption, polymorphism, packing, environment‑fingerprinting, timing attacks, steganography, file‑less execution.
Mitigation Layers – antivirus/anti‑malware, real‑time scanning, sandboxing, network segregation, air‑gap isolation.
---
📌 Must Remember
Virus → attaches to host file, replicates when host runs.
Worm → standalone, spreads automatically over networks.
Trojan → masquerades as legitimate software; often drops backdoors or other payloads.
Ransomware → locks system (locker) or encrypts files (crypto) until ransom paid.
Rootkit → modifies OS to hide malicious processes/files.
Fileless Malware → lives only in memory, uses legitimate tools (Living‑off‑the‑Land).
Static detection relies on signatures; dynamic detection relies on behaviour heuristics.
Polymorphic malware changes its code each infection to evade signature‑based detection.
Air‑gap = physical network isolation; still vulnerable to removable‑media attacks (e.g., Stuxnet).
Two‑factor authentication (2FA) dramatically lowers risk from weak passwords.
---
🔄 Key Processes
Malware Infection via USB
Plug in → OS auto‑runs (autorun) or reads macro‑enabled file → payload executed → possible dropper installs additional malware.
Static Signature Creation
Extract hash / byte pattern → store in AV database → compare each scanned file → match → quarantine.
Dynamic (Heuristic) Analysis
Launch sample in sandbox → monitor API calls, file writes, network traffic → flag if behavior deviates from baseline.
Ransomware Encryption (crypto‑type)
Generate random symmetric key → encrypt files → encrypt symmetric key with attacker’s RSA public key → demand ransom for private key.
Botnet Command‑and‑Control (C2) Communication
Infected host contacts C2 → receives instructions (spam, DDoS, data exfiltration) → executes.
---
🔍 Key Comparisons
Virus vs. Worm
Virus: needs host file/program → spreads when host is executed.
Worm: self‑contained → spreads over network without host files.
Locker Ransomware vs. Crypto Ransomware
Locker: blocks access to system/UI, no encryption.
Crypto: encrypts files and may lock system.
Static Analysis vs. Dynamic Analysis
Static: fast, signature‑based, can miss obfuscated/packed code.
Dynamic: slower, catches behavior, can be evaded by timing/environment checks.
File‑Based Malware vs. Fileless Malware
File‑Based: leaves malicious binaries on disk → detectable by AV.
Fileless: resides only in RAM, uses legitimate binaries → harder to detect.
Antivirus Real‑Time Scanner vs. Sandbox
Real‑Time: intercepts file access at kernel level → quick block.
Sandbox: isolates execution, useful for unknown/zero‑day samples.
---
⚠️ Common Misunderstandings
“All malware is a virus.” – Only a subset (virus) attaches to host files; worms, trojans, etc., are distinct.
“Antivirus catches everything.” – Signature‑based AV misses polymorphic, zero‑day, and fileless threats.
“Air‑gap means 100 % safe.” – Stuxnet shows removable media can bridge the gap.
“Rootkits only hide files.” – They also hide processes, network connections, and can alter kernel behavior.
“Disabling macros eliminates macro viruses.” – Attackers can also use PowerShell or other scripting engines.
---
🧠 Mental Models / Intuition
“Layered Onion” – Think of defenses as concentric layers: patches → AV → sandbox → network segmentation → air‑gap. Break through one layer, the next still protects.
“Payload vs. Delivery” – Separate the delivery mechanism (USB, email, exploit kit) from the payload (ransomware, keylogger). Changing one doesn’t automatically change the other.
“Memory‑Only = Invisible” – If a malicious action leaves no file, traditional AV can’t see it; focus on behaviour (process injection, PowerShell commands).
---
🚩 Exceptions & Edge Cases
Polymorphic vs. Metamorphic – Polymorphic changes only the decryption stub; metamorphic rewrites the entire code. Both evade signatures but metamorphic is rarer.
Zero‑Day Exploits – Malware may exploit a vulnerability that has no patch yet; signature‑based detection is ineffective.
Stegomalware – Hides malicious payload inside benign files (e.g., images); static hash comparison fails.
Timing‑Based Evasion – Malware executes only at specific times (e.g., at system boot); sandbox runs may miss the trigger.
---
📍 When to Use Which
Static analysis → first line for known families, quick triage of large file sets.
Dynamic analysis → unknown/obfuscated samples, zero‑day investigations.
Sandboxing → test potentially dangerous behavior without risking production systems.
Network segregation → limit spread of worms/botnets across critical subnets.
Air‑gap → protect high‑value industrial control systems; pair with strict media‑handling policies.
Real‑time AV → baseline protection for end‑user desktops; supplement with heuristic/ML detectors for advanced threats.
---
👀 Patterns to Recognize
Repeated “autorun” or macro prompts → classic USB or document‑based infection vector.
Sudden spikes in outbound traffic → possible C2 beacon from a botnet or ransomware exfiltration.
Unusual process names or parent‑child relationships → indicator of a rootkit or fileless malware using legitimate binaries.
Multiple failed login attempts followed by a successful login → credential‑theft or password‑spraying attack.
Encrypted files appearing en masse with new file extensions → crypto‑ransomware activity.
---
🗂️ Exam Traps
“A worm must attach to a file.” – Wrong; worms are standalone and spread via network.
“All ransomware encrypts files.” – Incorrect; locker ransomware only locks the UI.
“Fileless malware leaves no trace on disk, so it cannot be detected.” – Misleading; behavior‑based tools can still spot it.
“Installing an antivirus eliminates the need for patches.” – False; patches close vulnerabilities that AV can’t protect against.
“Rootkits only affect Windows.” – Incorrect; rootkits exist for Linux, macOS, and embedded systems.
---
or
Or, immediately create your own study flashcards:
Upload a PDF.
Master Study Materials.
Master Study Materials.
Start learning in seconds
Drop your PDFs here or
or