Limited-time offer! Save up to 50% Off | Solutions starting at $6 each  

Malware Analysis Assignment PDF

Added on - 17 Jun 2021

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 6 of 29 pages
Table of ContentsMALWARE ANALYSIS..........................................................................................................................2MALWARE...............................................................................................................................................2TYPES OF MALWARE...........................................................................................................................2PART 1-Task analysis...............................................................................................................................5Ransomware............................................................................................................................................14PART 2-Task analysis.............................................................................................................................15Environment and tools............................................................................................................................19References............................................................................................................................................251
MALWARE ANALYSISMALWAREMalware is defined as malicious software and it affects by the software in the computersystem. And malware is the kind of file or code and it enters the system through the network andit infect and steal the files for the attacker specification and it provide the remote control to theattacker and sued to steal the confidential data and analyze the affected user local network. Andit acts as a spy to cause affect. In that spyware is one type of malware and it works as monitor theuser location and has a concern about secret data and send the spam to the affected system toidentify the causes. And it acts as virtually for the attacker. Adware is another type of malwareand it make cause to the system by the way of sharing information and unwanted advertisementand works as software. And in that malware analysis worm and viruses are the important ad itaffects the entire system. For this malware prevention method in the way of anti-virus software.Firewall is another kind of protection against the malware. Malicious attack is in the way ofsoftware remove and steal the confidential data from the computer system. And this malicioussoftware has different types.TYPES OF MALWAREVirusesWormsTrojansRootkitsRATBotnetsSpywareTrapdoorLogic bombMobile malicious codeMalicious fontPolymorphic malware2
VirusesVirus is known a code or some software and it can get into the system easily by copyinganother program or when booting is happen it have a chance to enter in the computer system.And it can easily get into the system by the mail or the new downloaded files through the internetor it is used as either cd or pen drive. In that the viruses keep the piggyback and it entered andactivated when the user open the code and virus may delete the data and the files in the storagedisk of the system.WormsWorm is another kind of malware and in the system it can make causes through creatingduplicate files from its original document. And it entered in the system when the system is busyor in slowing process. And it is used to replicate the viruses and for the security vulnerabilities toagainst the system and worms do not works as attach with the programs or code do not need toalter the file and it can enter the system make cause in the file as duplicate without the useraction.TrojansTrojans also kind of malware it entered into the system in the way of programmable code orsoftware and it make a cause in the hard disk and also it is a part of malware. If Trojans enteredinto the computer system and activated it can make the programs out to the system. Compared toother viruses do not copy by the infection and also it has a part in malware and Trojans are likesoftware as attractive to the user.RootkitsIt acts as a software tool sued to the intruders get the access of computer knowledge withoutthe permission of the computer. And it is called as rootkit computers and it get through byvariety of operating systems such as windows and Linux. And it has three types of rootkits. Theyare kernel, library and application rootkits. And it works as the program to deliver the root levelaccess to the system. And it is known as masking software and it not contain the damagedsoftware’s. And it has no fear about the anti-virus and the removal of programs.3
RATRAT is known as remote admin Trojans and it has a remote control to access a system and it isused to get the password and steal the information and these kind of Trojans not visible to theusers and entered into the system through cd or pen drive. But this Trojans were created forproper users and later attackers use this remote access and make causes in the system. Butattackers do not list the actions or do not hack the actions through this Trojans.BotnetsBotnets is short form the robot networks and this is used to make an attack by the commandand control servers and this kind of viruses have various function and adaptable to every systemand also reduce the traffic by affected computers and also use the redundant servers.SpywareIt is also a kind of malware in the form of program or software and the main aim of this togetting the information about the person without the vision of the user. And informationuploaded in the internet as advertisement through this spyware. And it can enter into thecomputers in the way of installing new software by using pen drives or any other way. And itacts as a malware and get the information about the affected system and pass the information tothe attacker. And it is used to analyze the threats affected in the system and stolen informationand these kind of infections are more in the malware.TrapdoorTrapdoor is another kind of malware and it is used to get the access of the other systempermission like without knowing the password. And hackers generally use this trapdoor to getthe person details.Logic bomb4
Logic bomb also known as malware is like a programming code and it appearance likeexecutable files and it use the time or gap from the delay of the program execution and the logicbombs this delay and get into the system and delete the data.Mobile malicious codeIt is also a kind of malware and it acts like a remote access to get the information and it islook like a web documents and it executes in web browser.Malicious fontWebpages describe about the method of the font as malicious to work for the security.Polymorphic malwareThis kind of malware has the strength to morph and changing the vision of the code in thealgorithm often.PART 1-Task analysisBasic malware analysisIn the malware analysis the scenario is based on the mail had an attachment and have tocheck whether the attached file contains malicious. The person opened the file suddenly andknown it was infected so the process of malicious in the file is described below.Task analysisSocial engineering is the phrase adoption for deep area of malicious activitiesconsummate through human communication. Malicious mean at predetermined to damage upset5
other people. It helps to cognitive manipulation to technic handled through to made securityblunder, away emotional details.ATTACK METHODS:Social engineering charge get in many contrasting forms and can be acted alloverplace where human communication is joined. The five most natural forms of social engineeringaggression.1)Baiting 2) Scareware 3) pretexting 4) phishing 5) spear phishingBaitingBaiting attack adoption a fake agreement to a causality excess or concern. Users attractinto a bait that steals their important details or exact their installed systems with malware. Thecommitment scorn design of it adoption environmental media to get out malware. Causality takethe enticement out of eagerness and inside it into an effort or people computer output in electricharm run on the system.ScarewareScareware is a brand of malware created to technic fatality into bought anddownload worthless and possibly critical program. It, which run blooper that featurewindows computer messages, basically objective to antivirus or antispyware operatingsystem, a firewall function or an attendance soap. A general scareware lesson is theappropriate, like blooper leading assume in victims browser although surfing the network,output such content as, “your system be allowed affect along harm spyware software’6
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document