Malware analysis

Assignment Help Other Subject
Reference no: EM132914711

Project 2: Malware 1 (Phase I)

Malware Analysis (Project 2)

Phase I - Malware 1

You should answer the following questions about Malware 1 with True or False.

Item at position 1
A. Malware sets itself to run whenever Windows starts up
True
False

Item at position 2
B. Malware looks up the computer name (possibly doing some reconnaissance)
True
False

Item at position 3
C. Potentially looks through Microsoft Outlook address book contents
True
False


Item at position 4
D. Creates and executes a Visual Basic Script (VBS) called "WinVBS.vbs"
True
False

Item at position 5
.E. Prevents users from accessing registry tools
True
False

Item at position 6
F. Hides all drives on computer
True
False

Item at position 7
G. Prevents users from changing remote administrator settings
True
False

Item at position 8
H. Searches for all possible drives on computer
True
False

Item at position 9
I. Checks for its privileges (this isn't inherently malicious, but the malware possibly performs some different behaviors if it has the proper permissions to do so)
True
False

Item at position 10
J. Hooks the keyboard (potentially a keylogger)
True
False

Item at position 11
K. Hooks the mouse
True
False

Item at position 12
L. Potentially monitors messages before they appear in a window to the user (possible reconnaissance)
True
False

Item at position 13
M. Communicates with external hosts via IP addresses or domain names, possibly indicative of C2 activity.
True
False

Item at position 14
.N. Retrieves the current user's username
True
False

Item at position 15
O. Adds mutex for Eclipse DDoS malware
True
False

Item at position 16
P. Adds mutex for IPKillerClient malware
True
False

Item at position 17
Q. Adds mutex for DarkDDoSer malware
True
False

Item at position 18
R. Contacts various SMTP servers (possibly for spamming)
True
False

Item at position 19
S. Copies potentially malicious files to the device.
True
False

Item at position 20
.T. Adds a malicious cryptographic certificate to the system.
True
False

Project 2: Malware 2 (Phase I)
Malware Analysis (Project 2)
Phase I - Malware 2

You should answer the following questions about Malware 2 with True or False.

Item at position 1
A. Malware sets itself to run whenever Windows starts up
True
False

Item at position 2
B. Malware looks up the computer name (possibly doing some reconnaissance)
True
False

Item at position 3
C. Potentially looks through Microsoft Outlook address book contents
True
False

Item at position 4
D. Creates and executes a Visual Basic Script (VBS) called "WinVBS.vbs"
True
False

Item at position 5
E. Prevents users from accessing registry tools
True
False

Item at position 6
F. Hides all drives on computer
True
False

Item at position 7
G. Prevents users from changing remote administrator settings
True
False

Item at position 8
.H. Searches for all possible drives on computer
True
False

Item at position 9
I. Checks for its privileges (this isn't inherently malicious, but the malware possibly performs some different behaviors if it has the proper permissions to do so)
True
False

Item at position 10
J. Hooks the keyboard (potentially a keylogger)
True
False

Item at position 11
K. Hooks the mouse
True
False

Item at position 12
L. Potentially monitors messages before they appear in a window to the user (possible reconnaissance)
True
False

Item at position 13
M. Communicates with external hosts via IP addresses or domain names, possibly indicative of C2 activity.
True
False

Item at position 14
N. Retrieves the current user's username
True
False

Item at position 15
O. Adds mutex for Eclipse DDoS malware
True
False

Item at position 16
P. Adds mutex for IPKillerClient malware
True
False

Item at position 17

Q. Adds mutex for DarkDDoSer malware
True
False

Item at position 18
R. Contacts various SMTP servers (possibly for spamming)
True
False

Item at position 19
S. Copies potentially malicious files to the device.
True
False

Item at position 20
T. Adds a malicious cryptographic certificate to the system.
True
False


Project 2: Malware 3 (Phase I)
Malware Analysis (Project 2)
Phase I - Malware 3

You should answer the following questions about Malware 3 with True or False.


Item at position 1
.
A. Malware sets itself to run whenever Windows starts up
True
False

Item at position 2
B. Malware looks up the computer name (possibly doing some reconnaissance)
True
False

Item at position 3
C. Potentially looks through Microsoft Outlook address book contents
True
False

Item at position 4
D. Creates and executes a Visual Basic Script (VBS) called "WinVBS.vbs"
True
False

Item at position 5
E. Prevents users from accessing registry tools
True
False

Item at position 6
F. Hides all drives on computer
True
False

Item at position 7
G. Prevents users from changing remote administrator settings
True
False

Item at position 8
H. Searches for all possible drives on computer
True
False

Item at position 9
I. Checks for its privileges (this isn't inherently malicious, but the malware possibly performs some different behaviors if it has the proper permissions to do so)
True
False

Item at position 10
J. Hooks the keyboard (potentially a keylogger)
True
False

Item at position 11
K. Hooks the mouse
True
False

Item at position 12
L. Potentially monitors messages before they appear in a window to the user (possible reconnaissance)
True
False

Item at position 13
M. Communicates with external hosts via IP addresses or domain names, possibly indicative of C2 activity.
True
False

Item at position 14
N. Retrieves the current user's username
True
False

Item at position 15
O. Adds mutex for Eclipse DDoS malware
True
False

Item at position 16
P. Adds mutex for IPKillerClient malware
True
False

Item at position 17
Q. Adds mutex for DarkDDoSer malware
True
False

Item at position 18
R. Contacts various SMTP servers (possibly for spamming)
True
False

Item at position 19
S. Copies potentially malicious files to the device.
True
False

Item at position 20
T. Adds a malicious cryptographic certificate to the system.
True
False

Project 2: Malware 4 (Phase I)

Malware Analysis (Project 2)
Phase I - Malware 4

You should answer the following questions about Malware 4 with True or False.

Item at position 1
A. Malware sets itself to run whenever Windows starts up
True
False

Item at position 2
B. Malware looks up the computer name (possibly doing some reconnaissance)
True
False

Item at position 3
C. Potentially looks through Microsoft Outlook address book contents
True
False

Item at position 4
D. Creates and executes a Visual Basic Script (VBS) called "WinVBS.vbs"
True
False

Item at position 5
E. Prevents users from accessing registry tools
True
False

Item at position 6
F. Hides all drives on computer
True
False

Item at position 7
G. Prevents users from changing remote administrator settings
True
False

Item at position 8
H. Searches for all possible drives on computer
True
False
Item at position 9
I. Checks for its privileges (this isn't inherently malicious, but the malware possibly performs some different behaviors if it has the proper permissions to do so)
True
False

Item at position 10
J. Hooks the keyboard (potentially a keylogger)
True
False

Item at position 11
K. Hooks the mouse
True
False

Item at position 12
L. Potentially monitors messages before they appear in a window to the user (possible reconnaissance)
True
False

Item at position 13
M. Communicates with external hosts via IP addresses or domain names, possibly indicative of C2 activity.
True
False

Item at position 14
N. Retrieves the current user's username
True
False

Item at position 15
O. Adds mutex for Eclipse DDoS malware
True
False

Item at position 16
P. Adds mutex for IPKillerClient malware
True
False

Item at position 17
Q. Adds mutex for DarkDDoSer malware
True
False

Item at position 18
R. Contacts various SMTP servers (possibly for spamming)
True
False

Item at position 19
S. Copies potentially malicious files to the device.
True
False

Item at position 20
T. Adds a malicious cryptographic certificate to the system.
True
False

Project 2: Malware 5 (Phase I)
Malware Analysis (Project 2)
Phase I - Malware 5

You should answer the following questions about Malware 5 with True or False.

Item at position 1
A. Malware sets itself to run whenever Windows starts up
True
False

Item at position 2
B. Malware looks up the computer name (possibly doing some reconnaissance)
True
False

Item at position 3
C. Potentially looks through Microsoft Outlook address book contents
True
False

Item at position 4
D. Creates and executes a Visual Basic Script (VBS) called "WinVBS.vbs"
True
False

Item at position 5
E. Prevents users from accessing registry tools
True
False

Item at position 6
F. Hides all drives on computer
True
False

Item at position 7
G. Prevents users from changing remote administrator settings
True
False

Item at position 8
H. Searches for all possible drives on computer
True
False

Item at position 9
I. Checks for its privileges (this isn't inherently malicious, but the malware possibly performs some different behaviors if it has the proper permissions to do so)
True
False

Item at position 10
J. Hooks the keyboard (potentially a keylogger)
True
False

Item at position 11
K. Hooks the mouse
True
False

Item at position 12
L. Potentially monitors messages before they appear in a window to the user (possible reconnaissance)
True
False

Item at position 13
M. Communicates with external hosts via IP addresses or domain names, possibly indicative of C2 activity.
True
False

Item at position 14
N. Retrieves the current user's username
True
False

Item at position 15
O. Adds mutex for Eclipse DDoS malware
True
False

Item at position 16
P. Adds mutex for IPKillerClient malware
True
False

Item at position 17
Q. Adds mutex for DarkDDoSer malware
True
False

Item at position 18
R. Contacts various SMTP servers (possibly for spamming)
True
False

Item at position 19
S. Copies potentially malicious files to the device.
True
False

Item at position 20
T. Adds a malicious cryptographic certificate to the system.
True
False

Project 2: Phase II Dissect some behaviors
Malware Analysis (Project 2)
Phase II
You must answer the following open questions with regard to Phase II. Make sure you follow all of the project write-up instructions to the letter. There will be no credit given for typographical mistakes.


Item at position 1
Type the IP address for Malware 1's C2 Server in Dot-decimal notation (in case your analysis indicates there is no C2 Server being used by Malware 1 type "none" without quotes):

Item at position 2
Type the IP address for Malware 2's C2 Server in Dot-decimal notation (in case your analysis indicates there is no C2 Server being used by Malware 2 type "none" without quotes):

Item at position 3
Type the IP address for Malware 3's C2 Server in Dot-decimal notation (in case your analysis indicates there is no C2 Server being used by Malware 3 type "none" without quotes):

Item at position 4
Type the IP address for Malware 4's C2 Server in Dot-decimal notation (in case your analysis indicates there is no C2 Server being used by Malware 4 type "none" without quotes):

Item at position 5
Type the IP address for Malware 5's C2 Server in Dot-decimal notation (in case your analysis indicates there is no C2 Server being used by Malware 5 type "none" without quotes):

Item at position 6
External SMTP Servers Identification.
SMTP Servers DNS domain names in a comma- separated list, without spaces:

Project 2 Phase III
Cluster and Classify: 15 points
Upload your final malheur configuration file (config.mlw)

Phase IV Malheur Summary

The solution for this part must be submitted on grapescope.com and see what your autograder score before you send me the solution.

Attachment:- project assignment.rar

Reference no: EM132914711

Questions Cloud

Determine the organisation requirements : What credit arrangements might apply when organising travel and how will you determine the organisation's requirements?
Advantages and disadvantages of various revenue sources : There are several advantages and disadvantages of various revenue sources as payment for services rendered in health care (e.g., managed care, prospective, retr
Explain the concept of triangular trade : Explain the concept of triangular trade and its relation to colonialism?
Calculate the price xyz cc should price per : XYZ cc a chair manufacturer has the following assumptions: Variable cost is constant N$24 per unit Fixed cost is constant N$30 500.00
Malware analysis : Malware Analysis - Dissect some behaviors and malware possibly performs some different behaviors if it has the proper permissions to do so)
Interpret international business strategies : Summarize and interpret international business strategies and various entry modes.
Why are metrics and timelines appropriate for a business : Why are metrics and timelines appropriate for a business analysis for Best Buy
List 6 prohibited areas of discrimination : List 6 prohibited areas of discrimination your company's diversity policy should address. List 3 examples of policies that may cover aspects of businesses opera
Explain porsche decision : International competition and markets have encouraged businesses to spread activities across the world. To develop and market its luxury Cayenne model, Porsche

Reviews

Write a Review

Other Subject Questions & Answers

  Why should nurses be interested in learning about ebp

What is the difference between research- and evidence-based practice projects? Provide an example of each one and the reason for the difference.

  Addresses the general differences between jcaho and jci

Addresses The general differences between JCAHO and JCI. Be a voiceover PowerPoint less than 5 minutes in length or have extensive notes below the slides.

  Why your question is important to you as a member of society

Explain why your question is important to you as a member of society? Explain why studying human behavior and identity is a valuable human endeavor

  Why price and utilization economic factors in the healthcare

Evaluate the fundamental reasons why price and utilization economic factors in the healthcare setting influence competitive market status in regard to supply and demand for health care services.

  Recommend emotional behavior disorder assessments

Recommend Emotional Behavior Disorder assessments that need to be discontinued and why they need to be discontinued.

  Describe how the book meets your assigned criteria

Discuss ways in which we use the alphabetic principle in our classrooms or daily lives. Use the video for examples. Then, provide the title and author.

  Paper related to a topic on an aspect of adulthood

You are required to complete a 3-5 page term paper related to a topic on an aspect of adulthood. You can choose a psychological disorder, menopause, Alzheimer's disease, etc

  Are you under the influence of a high or low pressure system

Are you under the influence of a High- or Low-pressure system? What does that mean for your current weather? Review the National Weather Service's Forecast Maps

  Topic area related to forensic psychology

For this assignment, you will perform a search for five resources in a chosen topic area related to forensic psychology.

  Frequently in leadership evaluations

What are your thoughts regarding the use of 360-degree assessments as part of the appraisal process? As we know, these are used frequently in leadership evaluations, but not typically in the employee evaluation process. Do you think the input of..

  Create the work breakdown structure

Create the work breakdown structure (level 1 of wbs at least 7 and level 2 at least 20) Explain in details for the work packages.

  Cultural history and legacy

Judaism, Christianity, Islam, Hinduism, and Buddhism are considered religions because their spiritual messages apply to all of humanity rather than to just their own cultural history and legacy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd