- Mastering Reverse Engineering
- Reginald Wong
- 171字
- 2021-06-10 19:40:27
Malware file properties
The initial behavior of common malware is to drop a copy of itself, drop its malware component embedded in it, or download its malware component. It creates the dropped files which are usually found in these folders:
- The Windows System folder: C:\Windows\System32
- The Windows folder: C:\Windows
- The user profile folder: C:\Users\[username]
- The Appdata folder: C:\Users\[username]\AppData\Roaming
- The recycle bin folder: C:\$Recycle.Bin
- The desktop folder: C:\Users\[username]\Desktop
- The temporary folder: C:\Users\[username]\AppData\Local\Temp
As part of its social engineering, another cheap technique is to change the icon of a malware file to something that would lure the user to open it, for example, folder icons, Microsoft Office icons, or Adobe PDF icons. It also uses file names that are deceiving, such as the words INVOICE, New Folder, Scandal, Expose, Pamela, Confidential, and so on. The following screenshot gives examples of actual malware that mimics known documents:

Notice that highlighting the fake PDF file shows that it is actually an application.
推薦閱讀
- API安全實戰(zhàn)
- 信息系統(tǒng)安全檢測與風險評估
- 代碼審計:企業(yè)級Web代碼安全架構(gòu)
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計技術(shù)揭秘
- Learning Devise for Rails
- 軟件安全保障體系架構(gòu)
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- SQL Injection Strategies
- 網(wǎng)絡(luò)空間安全導(dǎo)論
- Mastering Malware Analysis
- 黑客攻防從入門到精通:命令版
- 云計算安全:關(guān)鍵技術(shù)、原理及應(yīng)用
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter
- 惡意軟件、Rootkit和僵尸網(wǎng)絡(luò)
- Web安全之機器學習入門