Skip to the content.

Malware

Malwares

A malware is a software that is detrimental to the operations of the host. In the old days, all malware starts out as a virus, which spreads across a network and replicates only through definite user interaction.

A malware attack is an exploit technique is a specific method by which malware code infects a target host.

PUPs or Potentially Unwanted Programs are softwares that may have negative or undesirable effects.

Fileless Malware

Used to create a process in the system memory without relying on the local file.

Two-stage Deployment

Most modern malware uses a two-stage deployment.

Step 1: Dropper or Downloader

Step 2: Downloader

Actions on Objective

Once the attacker has spread his footprint on your network and they’ve established a stronghold, he can then transition into the “Action on Objectives” Phase. On thi phase, the attackers can then will execute their primary objectives.

Concealment

Final step of the attack. This will help the threat actor prolong unauthorized access to the system, which can be done by hiding tracks, erasing log files, or hiding any evidence.

Malware Delivery

Common Deployment Techniques

Common techniques to deploy malicious code:

Living off the Land

A strategy adopted by many Advanced Persistent Threats (APTs) and criminal organizations.