Chap-1 (Malware Analysis) (Sem-5)
Chap-1 (Malware Analysis) (Sem-5)
Chap-1 (Malware Analysis) (Sem-5)
MALWARE
• Viruses • Backdoor
• Spyware • Downloader
• Adware • Launcher
• Ransomware • Rootkit
• Keylogger • Scareware
• Botnet • Spamware
VIRUSES
• Malicious code that installs itself onto a computer to allow the attacker access.
• Backdoors usually let the attacker connect to the computer with little or no
authentication and execute commands on the local system.
DOWNLOADER
• Malware that infects a user’s machine and then uses that machine to send
spam.
• This malware generates income for attackers by allowing them to sell spam-
sending services.
RANSOMWARE
• The ransom malware blocks the user from accessing the files or programs and
the malware removal demands to pay the ransom through certain online
payment methods.
• Once the amount is paid the user can resume using their system.
KEY-LOGGER
• Tools designed to record every keystroke on the affected machine for later
retrieval
• It stores the data regarding each and every key user presses on the keyboard.
• It is very commonly used method to get username and passwords from a
legitimate user.
BOTNET
• The cybercriminal blocks a user actions and takes full control of the system.
• The hacker creates a network of malware-infected computers which functions
as a bot.
• The botnet is used to transmit malware, send spam emails, and execute other
malicious tasks.
MALWARE ANALYSIS
• Static Analysis
• Basic
• Advance
• Dynamic Analysis
• Basic
• Advance
BASIC STATIC ANALYSIS
• Basic static analysis consists of examining the executable file without viewing
the actual instructions.
• Basic static analysis can confirm whether a file is malicious, provide information
about its functionality, and sometimes provide information that will allow you
to produce simple network signatures.
• Basic static analysis is straightforward and can be quick, but it’s largely
ineffective against sophisticated malware, and it can miss important behaviors.
BASIC DYNAMIC ANALYSIS
• Basic dynamic analysis techniques involve running the malware and observing
its behavior on the system in order to remove the infection, produce effective
signatures, or both.
• However, before you can run malware safely, you must set up an environment
that will allow you to study the running malware without risk of damage to
your system or network.
• Like basic static analysis techniques, basic dynamic analysis techniques can be
used by most people without deep programming knowledge, but they won’t be
effective with all malware and can miss important functionality.
ADVANCED STATIC ANALYSIS