mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-21 07:54:20 +01:00
38 lines
2.3 KiB
Markdown
38 lines
2.3 KiB
Markdown
---
|
|
layout: default
|
|
permalink: /RE101/section2/
|
|
title: Malware Techniques
|
|
---
|
|
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
|
|
|
|
# Section 2: Malware Overview #
|
|
|
|
## Typical Attack Flow ##
|
|
|
|
| Perimeter Recon | Infiltrate | Internal Recon | Entrench | Exfiltrate | Purge |
|
|
| ------------ |:------------:|:------------:|:------------:|:------------:|:------------:|
|
|
|  |  |  |  |  |  |
|
|
|
|
|
|
## Malware Classes
|
|
|
|
| Class | Description |
|
|
| --- | --- |
|
|
| **Virus** | code that propagates (replicates) across systems with user intervention |
|
|
| **Worm** | code that self-propagates/replicates across systems without requiring user intervention |
|
|
| **Bot** | automated process that interacts with other network services |
|
|
| **Trojan** | malware that is often disguised as legitimate software |
|
|
| **Ransomware** | malware that holds the victim's data hostage by cryptography or other means |
|
|
| **Rootkit** | masks its existence or the existence of other software |
|
|
| **Backdoor** | enables a remote attacker to have access to or send commands to a compromised computer |
|
|
| **RAT** | Remote Access Trojan, similar to a backdoor |
|
|
| **Info Stealer** | steals victims information, passwords, or other personal data |
|
|
| **HackTool** | admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious |
|
|
| **Hoax** | program may deliver a false warning about a computer virus or install a fake AV |
|
|
| **Dropper/Downloader** | designed to "install" or download some sort of malware |
|
|
| **Adware** | automatically renders advertisements in order to generate revenue for its author.|
|
|
| **PUP/PUA** | Potentially Unwanted Program, sometimes added to a system without the user's knowledge or approval |
|
|
|
|
|
|
[x86 Assembly <- Back](https://securedorg.github.io/RE101/section1.3) | [Next -> Malware Techniques](https://securedorg.github.io/RE101/section2.1)
|