Skip to content

Latest commit

 

History

History
37 lines (29 loc) · 2.25 KB

malware.md

File metadata and controls

37 lines (29 loc) · 2.25 KB
layout permalink title
default
/RE101/section2/
Malware Techniques

Go Back to Reverse Engineering Malware 101

Section 2: Malware Overview

Typical Attack Flow

Perimeter Recon Infiltrate Internal Recon Entrench Exfiltrate Purge
alt text alt text alt text alt text alt text alt text

Malware Classes

Class Description
Virus code that propagates (replicates) across systems with user intervention
Worm code that self-propagates/replicates across systems without requiring user intervention
Bot automated process that interacts with other network services
Trojan malware that is often disguised as legitimate software
Ransomware malware that holds the victim's data hostage by cryptography or other means
Rootkit masks its existence or the existence of other software
Backdoor enables a remote attacker to have access to or send commands to a compromised computer
RAT Remote Access Trojan, similar to a backdoor
Info Stealer steals victims information, passwords, or other personal data
HackTool admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious
Hoax program may deliver a false warning about a computer virus or install a fake AV
Dropper/Downloader designed to "install" or download some sort of malware
Adware automatically renders advertisements in order to generate revenue for its author.
PUP/PUA Potentially Unwanted Program, sometimes added to a system without the user's knowledge or approval

x86 Assembly <- Back | Next -> Malware Techniques