You are on page 1of 31

MALWARE ANALYSIS

MALWARE

MALWARE ANALYSIS

CONTENT MALWARE IDENTIFICATION METHODS

S
MALWARE PREVENTION

MALWARE HIDING PLACES


MALWARE
• Software that is specifically designed to
gain access to or damage a computer.

• Consists of code developed by cyber


attackers.

• Cybercriminals use it to extract data that


they can leverage over victims for
financial gain.
TYPES

• Virus
• Worms
• Malvertising
• Ransomware
VIRUS

• Malicious piece of computer code


designed to spread from device to device.

• Programmed to harm computer by


damaging programs, deleting files ,
reformatting the hard drive.
WORM

• Type of malware which


spreads copies of itself from
computer to computer.

• Can replicate itself without


any human interaction.
• Used by cybercriminals to inject malicious code into legitimate online
MALVERTISING advertising networks and web pages.

• Typically redirects users to malicious websites or installs malware on

their computers or mobile devices.


RANSOMWAR
E

• Malware that encrypts


a victims files.

• Attacker then demands


ransom from the victim
to restore access to the
data upon payment.
MALWARE
ANALYSIS

• Process of understanding the


behavior and purpose of a
suspicious file or URL.

• Malware samples are analyzed and


determined.

• Done manually by experts.


TYPES

• Static Analysis

• Dynamic Analysis

• Hybrid Analysis
STATIC ANALYSIS
• Process of software debugging without executing the code / program.

• Can be implemented on various representations of program.

• Also called static code analysis.


DYNAMIC ANALYSIS

• Allows malware analyst to monitor


the execution of malware at each
step.

• Dynamic analysis opens and


executes files in an isolated
sandbox environment .
HYBRID ANALYSIS

• Includes both Static


Analysis and Dynamic
Analysis.

• Helps in detecting
unknown threats even
those from the most
sophisticated malware.
STAGES

• Static Properties
Analysis

• Interactive Behaviour
Analysis

• Fully Automated
Analysis

• Manual Code Reversing


CONFIDENTIALITY

• Information is not disclosed to


unauthorized individuals, entities and
process.

• Passwords, encryption,
authentication, and defense against
penetration attacks are used to
ensure confidentiality.
INTEGRITY

• Means maintaining accuracy


and completeness of data.

• Way of implementing security


controls that ensure data
cannot be modified or deleted
by an unauthorized person .
AVAILABILITY

• Means information must be


available when needed.

• Ensuring data availability


means matching network
and computing resources to
the volume of data access.
NON REPUDIATION

• Assurance that someone


cannot deny something.

• Data Integrity and


Authenticity are pre requisites
for Non Repudiation.
AUTHENTICITY
• An integral component of
information security.

• Helps to reduce instances of


fraud by way of
misrepresentation.
ACCOUNTABILIT
Y

• Essential part of an
information security plan.

• Means that it should be


possible to trace actions of
an entity uniquely to that
entity.
MALWARE IDENTIFICATION
METHODS

• Anti Malware Signature

• Heuristic Analysis

• Behavioural Audits
ANTI MALWARE SIGNATURE

• Algorithm / hash that is used


to uniquely identify malware.

• Are representations of
complete files / pieces of
code that have already been
discovered as malicious.

• Commonly used way to


identify malware .
HEURISTIC
ANALYSIS

• Method of detecting viruses


by examining code for
suspicious properties.

• Is a expert based analysis


which determines the
susceptibility of a system .
BEHAVIOURAL AUDITS

• Consist of executing code and


observing its interactions with
the computer / server .

• Performed by a person within a


virtual / sandboxed environment.
MALWARE
PREVENTION

• Install Anti Virus software

• Regularly update software

• Only buy Apps from trusted


sources

• Install Firewall
MALWARE HIDING
PLACES

• In Software Downloads

• In Email Attachments

• In Online Ads

• In Infected Websites

CONT….
MALWARE HIDING
PLACES

• In Torrent Downloads

• In Fake Free Wi-fi Hotspots

• In Pop-ups

• In Social Media Posts &


Messages
• Slow computer

• Blue screen of death


MALWARE WARNING
SIGNS • Programs opening and closing automatically

• Lack of storage space

CONT….
MALWARE WARNING SIGNS
• Suspicious modem and hard drive activity

• Pop-ups, websites, toolbars and other unwanted programs

• Sending out spam


REFERENCE

• https://www.metacompliance.com/blog/what-is-malware-and-
how-to-prevent-against-it/

• https://www.crowdstrike.com/cybersecurity-
101/malware/malware-analysis/
THANK YOU

You might also like