官术网_书友最值得收藏!

Malware file properties

The initial behavior of common malware is to drop a copy of itself, drop its malware component embedded in it, or download its malware component. It creates the dropped files which are usually found in these folders:

  • The Windows System folder: C:\Windows\System32
  • The Windows folder:  C:\Windows
  • The user profile folder:   C:\Users\[username]
  • The Appdata folder:  C:\Users\[username]\AppData\Roaming
  • The recycle bin folder:  C:\$Recycle.Bin
  • The desktop folder: C:\Users\[username]\Desktop
  • The temporary folder:  C:\Users\[username]\AppData\Local\Temp

As part of its social engineering, another cheap technique is to change the icon of a malware file to something that would lure the user to open it, for example, folder icons, Microsoft Office icons, or Adobe PDF icons. It also uses file names that are deceiving, such as the words INVOICE, New Folder, Scandal, Expose, Pamela, Confidential, and so on. The following screenshot gives examples of actual malware that mimics known documents: 

Notice that highlighting the fake PDF file shows that it is actually an application.

主站蜘蛛池模板: 凯里市| 大兴区| 云和县| 兴业县| 伊川县| 湖北省| 凌源市| 错那县| 郴州市| 康保县| 赤壁市| 那曲县| 宝丰县| 琼结县| 宁国市| 什邡市| 通州区| 灌云县| 黑山县| 东安县| 西昌市| 裕民县| 安溪县| 太湖县| 洪江市| 获嘉县| 永州市| 重庆市| 山丹县| 陇南市| 拉孜县| 合山市| 绵竹市| 历史| 和田市| 玉树县| 新宁县| 黑龙江省| 临朐县| 宜兴市| 手游|