Malware is software specifically designed to perform malicious actions. Malware may disrupt, damage, or provide unauthorized access to a computer system.
Malware is used both maliciously by criminals and benignly by authorized personnel to test the security controls of an organization.
Links to this note
- virus (computer)
- … hidden directory
- .debug_info section used for attribution
- /etc/ld.so.preload persistence
- Agent.BTZ
- AMSI
- anti-analysis
- anti-malware
- anti-sandbox
- anti-virus
- attackofthings-level3-2016
- attribution by algoritm usage
- attribution by domain reuse
- attribution by language usage
- backdoor
- banking trojans
- banner grabbing
- bashrc used for persistence
- binary analysis
- bind on a port as a mutex
- Blackcat Ransomware
- Bokbot
- botnet
- Buckshot Yankee
- Chaos malware
- chaos-blacklotuslabs2022
- chaos-lang2023
- china-linked hackers target Linux systems-antoniuk2024
- code reuse as attribution
- command and control
- Compiler Options - Anti-Reversing
- ComRAT
- covert channel
- credential stealer
- CronRAT
- crypter
- cryptocurrency mining malware
- curl | sh
- customized UPX packers
- ddostf
- Decoy Dog
- DefenderCheck
- Discord-based C2
- DLL injection
- DNS sinkhole
- Domain Generation Algorithm
- DOUBLEFANTASY
- dropper
- elfmaster
- Emotet
- enumerate processes
- equationdeathstar-great2015
- file infector
- fileless malware
- fingerprint
- fingerprinting using User-Agents
- Flame
- function name randomization
- Golang malware
- GReAT
- handle.exe
- hard-coded passwords
- hasherezade
- Hell's Gate
- hidden files and directories
- homoglyph obfuscation
- hooks
- HTTP C2
- imphash
- implant
- incidentresponse-luttgens2014
- IP Address Obfuscation
- IPfuscation
- IRC command and control
- Kaiji malware
- Kaiten malware
- keylogger
- known_hosts cracking
- LD_PRELOAD
- Linux Malware
- linux malware - skill and knowledge requirements
- loader
- log wiper
- LOLBin
- MACfuscation
- macOS malware
- Magecart
- magic packet
- Main Index
- Main Index - M
- malicious domain
- Malvuln Project
- malware campaign
- malware capabilities
- malware checking for installed software
- malware checking for known malware
- malware checking for security software
- malware classes
- malware development
- malware development essentials-sektor7
- malware disguising User-Agent strings
- malware family
- malware gathering system information
- malware installing additional software
- malware propagation
- malware replacing legitimate system components
- malware setting files as immutable or append only
- malware strain
- malware triage
- malware update capability
- malware using mutexes
- Manual Analysis
- matryoshka obfuscation
- memory forensics
- million dollar dream
- Mirai
- mod_backdoor
- modular malware
- Moonlight Maze samples
- multiplatform malware
- Nirsoft false positives
- NoaBot
- noabot-constantin2024
- old malware
- packer
- pamgoesrogue-sharma2003
- patching
- PE entry redirection
- Penguin Turla
- Persistence
- Process Injection
- process masquerading
- Prometei
- quarantine
- Ransomware
- RC4
- remediation
- Remote Access Trojan
- rootkit
- rootkits hiding CPU usage
- sample
- Sansec
- SecureList
- SHA256
- shellcode
- signature (anti-virus)
- Skidmap Indicators of Compromise (IoCs)
- Skidmap malware
- skimmer
- Skuld malware
- skuld-taniumcti2023
- SmokeLoader
- Software Exploits
- spyware
- SSH key persistence
- SSH key theft
- SSH password stealer
- SSH scanning
- stack strings
- staged malware
- stop treating security tools like magic boxes
- string hashing
- string obfuscation
- strings as attribution
- Stuxnet
- symbiote-kennedy2022
- systemd service persistence
- tapi32d.exe
- teensy ELF files
- territorial malware
- ThreatCheck
- TLS directory injection
- TLS takes precedence over main()
- trackingteamtnt-fiser2021
- tricephalichellkeeper-pourcelot2022
- trojan
- Tsunami malware
- typecli.exe
- typos as an indicator of hands on keyboard
- typos in malware
- upx_dec
- user account persistence
- userland exec
- Virtual Machine Detection
- VirusTotal
- VMProtect
- VX
- VX Heaven
- wacatac
- watering hole attack
- web shell
- worm
- xor string obfuscation
- XORDDOS malware
- YARA