官术网_书友最值得收藏!

Malware file properties

The initial behavior of common malware is to drop a copy of itself, drop its malware component embedded in it, or download its malware component. It creates the dropped files which are usually found in these folders:

  • The Windows System folder: C:\Windows\System32
  • The Windows folder:  C:\Windows
  • The user profile folder:   C:\Users\[username]
  • The Appdata folder:  C:\Users\[username]\AppData\Roaming
  • The recycle bin folder:  C:\$Recycle.Bin
  • The desktop folder: C:\Users\[username]\Desktop
  • The temporary folder:  C:\Users\[username]\AppData\Local\Temp

As part of its social engineering, another cheap technique is to change the icon of a malware file to something that would lure the user to open it, for example, folder icons, Microsoft Office icons, or Adobe PDF icons. It also uses file names that are deceiving, such as the words INVOICE, New Folder, Scandal, Expose, Pamela, Confidential, and so on. The following screenshot gives examples of actual malware that mimics known documents: 

Notice that highlighting the fake PDF file shows that it is actually an application.

主站蜘蛛池模板: 玛纳斯县| 津南区| 黄浦区| 东阿县| 彰化县| 黔江区| 普宁市| 宁化县| 土默特左旗| 重庆市| 宣城市| 托里县| 中卫市| 哈巴河县| 南木林县| 阳西县| 湖州市| 工布江达县| 健康| 察隅县| 洛浦县| 灯塔市| 阳泉市| 无极县| 建阳市| 万源市| 岳池县| 罗田县| 班玛县| 炉霍县| 平阳县| 浪卡子县| 远安县| 塔河县| 环江| 卓尼县| 凌海市| 綦江县| 江北区| 阳谷县| 西青区|