Malware Handbook
  • Preface
  • Author
  • Prerequisites for Malware
  • Prerequisites for Lab Set-Up
  • Setting Up Labs
  • Download Sample Malware Exercises
  • Intro to Assembly Language
  • Assembly Language Basics
  • Commonly Used Instructions
  • Win32 Assembly Programming
  • PE Format
    • PE32
    • PE32+
  • Malware
    • Types of Malware
    • Malware Classification by Windows Defender
    • Sourcing Malware
  • Malware Development
  • Malware Analysis
    • Malware Analysis Methodologies
      • Static Analysis
        • Static Analysis Tools/Methods
        • Static Analysis of Sample Files
      • Dynamic Analysis
        • Dynamic Analysis Tools/Methods
        • Analyzing Files with Regshot, Process Monitor, and Wireshark
        • Analyzing calc.exe and Network Activity
      • Manual Code Reversing
        • Reverse Engineering Simple Windows Executable Files
        • Reverse Engineering re_lotsastuff.exe
        • Reverse Engineering re_lotsastuff.exe Using Ghidra
      • Analyzing PowerShell Scripts
      • Analyzing JavaScript Samples
        • Analyzing JavaScript in HTML
      • Analyzing Macro Code in Office Documents
      • Setting Up REMnux Environment
        • Setting Up and Configuring FakeNet in REMnux
      • Analyzing an ELF File
      • Analyzing ASPX Webshells
      • Analyzing JAR Files
    • SAMPLE NOTES (of Notes.txt)
Powered by GitBook
On this page
  1. Malware

Types of Malware

  • Virus: A type of malware that replicates itself by modifying other computer programs and inserting its own code.

  • Worm: A standalone malware computer program that replicates itself in order to spread to other computers.

  • Trojan: A type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.

  • Ransomware: A type of malware which threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

  • Spyware: A type of malware that is designed to gather information about a person or organization without their knowledge.

  • Adware: A software that automatically displays or downloads advertising material (often unwanted) when a user is online.

  • Scareware: A type of malware that uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software.

  • Rootkit: A collection of software tools that enable an unauthorized user to gain control of a computer system without being detected.

  • Dropper: A type of malware that has been designed to "drop" or install itself or other viruses onto a computer.

  • Downloader: A type of malware that primarily focuses on downloading and installing other malware onto the infected system.

  • Backdoor: A method of bypassing normal authentication procedures, usually over a network connection, to gain remote access to a computer system.

  • Keylogger: A type of malware that records every keystroke a user makes on the keyboard without the user's knowledge, with the intent of capturing sensitive information like usernames, passwords, and credit card details.

  • Infostealer: A type of malware that is designed to seek out and steal important data from the victim's computer, such as personal and financial information.

PreviousMalwareNextMalware Classification by Windows Defender