layout
default
permalink
/RE101/section2/
title
Malware Techniques
Go Back to Reverse Engineering Malware 101
Section 2: Malware Overview
Perimeter Recon
Infiltrate
Internal Recon
Entrench
Exfiltrate
Purge
Class
Description
Virus
code that propagates (replicates) across systems with user intervention
Worm
code that self-propagates/replicates across systems without requiring user intervention
Bot
automated process that interacts with other network services
Trojan
malware that is often disguised as legitimate software
Ransomware
malware that holds the victim's data hostage by cryptography or other means
Rootkit
masks its existence or the existence of other software
Backdoor
enables a remote attacker to have access to or send commands to a compromised computer
RAT
Remote Access Trojan, similar to a backdoor
Info Stealer
steals victims information, passwords, or other personal data
HackTool
admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious
Hoax
program may deliver a false warning about a computer virus or install a fake AV
Dropper/Downloader
designed to "install" or download some sort of malware
Adware
automatically renders advertisements in order to generate revenue for its author.
PUP/PUA
Potentially Unwanted Program, sometimes added to a system without the user's knowledge or approval
x86 Assembly <- Back | Next -> Malware Techniques