官术网_书友最值得收藏!

Malware file properties

The initial behavior of common malware is to drop a copy of itself, drop its malware component embedded in it, or download its malware component. It creates the dropped files which are usually found in these folders:

  • The Windows System folder: C:\Windows\System32
  • The Windows folder:  C:\Windows
  • The user profile folder:   C:\Users\[username]
  • The Appdata folder:  C:\Users\[username]\AppData\Roaming
  • The recycle bin folder:  C:\$Recycle.Bin
  • The desktop folder: C:\Users\[username]\Desktop
  • The temporary folder:  C:\Users\[username]\AppData\Local\Temp

As part of its social engineering, another cheap technique is to change the icon of a malware file to something that would lure the user to open it, for example, folder icons, Microsoft Office icons, or Adobe PDF icons. It also uses file names that are deceiving, such as the words INVOICE, New Folder, Scandal, Expose, Pamela, Confidential, and so on. The following screenshot gives examples of actual malware that mimics known documents: 

Notice that highlighting the fake PDF file shows that it is actually an application.

主站蜘蛛池模板: 庄浪县| 大安市| 大理市| 丹棱县| 塔城市| 方山县| 陆川县| 榆树市| 永嘉县| 灵山县| 河曲县| 江口县| 时尚| 西青区| 深州市| 台州市| 安庆市| 图木舒克市| 安远县| 方正县| 新和县| 遵义县| 泰和县| 怀宁县| 平塘县| 乡宁县| 泗洪县| 建瓯市| 鱼台县| 延长县| 博白县| 无为县| 剑阁县| 志丹县| 蕲春县| 瑞安市| 苏尼特右旗| 英超| 长子县| 正镶白旗| 齐齐哈尔市|