Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Approaches to Malware Analysis
There are two fundamental approaches to malware analysis: static and dynamic.

Static analysis involves examining the malware without running it.
Dynamic analysis involves running the malware.

Following are some terms commonly used in malware analysis, with their definitions.

Spear phishing — To send emails with malicious content (attachments, links, or fraudulent messages) to specific persons of particular interest
Exploit — An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
Drop — The online location where malware delivers stolen information.
FUD — FUD means “fully undetectable,” i.e., the program cannot be detected by antivirus tools
SFX — Self-extracting, referring to executable programs that are also archives, which extract and sometimes execute the archive content when run.
MD5 — A so-called hash, i.e., a number calculated on the basis of data that identifies these with high confidence. MD5s in this paper are used to identify files.
Thanks for the post keep up with these Hq posts.

Forum Jump:

Users browsing this thread: 1 Guest(s)