Author Topic: [TUT] Understanding the difference between different types of malware.  (Read 3356 times)

0 Members and 1 Guest are viewing this topic.

Offline Danus

  • Serf
  • *
  • Posts: 39
  • Cookies: 24
  • Jewish Coder
    • View Profile
Introduction
This tutorial will cover in detail the difference between different types of malware, since most people call everything they see a virus, There are 3 "main" types of malware, a Virus, A Worm and a Trojan, each of those malware break into other sub sections like, A backdoor caused by a trojan (Trojan.backdoor), Email worm(Worm.Email) and so on. ill try to cover in detail each type.

Malware
Short for Malicious Software, a program that is created to potentially harm your computer in anyway. such as stealing data, corrupting data, stealing money and using your own computer against you or other people. Malware is a Trojan, a virus or a worm.

Payload
A payload is the "cargo" that the malware unloads on exectuion or a spesific date, it could be anything. most payloads corrupt data, connect the user to a botnet or just make the computer unusable. examples: Worm.Email.Gruel, Virus.CIH, Trojan.backdoor.darkcomet

Virus
Much like a biological virus, a computer virus attempts to infect hosts by injecting its code to other files, in this way the virus replicates itself thus executing each time the user runs an infected file, unlike other malware the virus needs human existence to work, first a user must activate the infecting file and then launch other programs each to for the virus to infect, if the user doesn't press anything the virus wont run unless the files the virus infected are already running, each virus has a payload that executes on a specific date or instantly. Although viruses need humans to live it is a very very dangerous malware, when game companies released disks infected with the CIH for example(Yeah it happened) a lot of users lost their data because of the malicious payload the virus had. Over writing the Master Boot record with zeros.
Marco viruses who used Microsoft Office exploits email themselves and destroy computers, Like the Mellisa macro virus who was email and believed to have porn passwords. on execution the virus would corrupt data making the computer un-booteble. A virus payload could also open random files and folders and open porn websites just too annoy the user.

Worm
A computer worm also is a self replicating program that attempts to spread itself using that replication, unlike a virus worms do not modify files and destroy them, worms do not need human existence to work, once a worm has run it can function alone. Worms consume a lot of bandwith because they attempt to spread using the network, worms often install backdoors in the computer to connect the computer to a botnet or a RAT. worms often delete files in the system to remain undetected or destroy the computer.The Gruel worm for example arrived in an email with a very malicious payload, once activated it would mass email itself and then remove files from System32, opening random files, websites, constantly opening message boxes, creating a lot of errors that cause Blue Screens of death, restoring the computer to a normal state after the infection of the Gruel worm is almost impossible.
Another example of a worm is the MyDoom worm, on execution the payload would mass email itself to other computers, open a backdoor and then launch a DDOS attack on www.sco.com. the email form would look like this:"andy; I'm just doing my job, nothing personal, sorry".
Later the DoomJuice worm exploited backdoors that were opened in computers by MyDoom to connect the computer to a botnet.

Trojan
Before we talk about the Trojan i want to tell you guys a little story, Long time ago two countries had a war, The Greeks had decided to give a small present to the City of Troy to end the war, so they brought a big wooden horse as a present to the people of Troy, once the present entered the big city, who was heavily protected with men and huge walls, they opened the horse and a huge amount of Greek soldiers raided the city, destroying and burning it to the ground.
A trojan arrives as a legitimate program, it would appear like a regular program, an Anti-Virus, A windows update or even a hacking tool, on execution it would drop a very malicious payload, it could be anything, from annoying the user and connecting him to a botnet without hes acknowledgement or encrypting the users files and asking for a ransom for decrpytion(CryptoLocker,CryptoBit). A trojan is a Keylogger, A  trojan is a backdoor.
The difference between other malware and a trojan is that a Trojan doesnt replicate itself or attempt to spread itself or need human action to exist.(besides from executing the infected file)
A very dangerous trojan was the CryptoLocker, who encrypted files on execution and demanded a 300 dollar ransom to decrypt the files.

Ransomware or Scareware



The big pathological liar of all malware, the Ransomware or the Scareware. The names are given for obvious reasons.. Scaring the victim and asking for a ransom. Ransomware is usually classified as a trojan. The ransomware will usually arrive as a legitimate program, downloadable porn, new updates, hacking tools. Anything, on execution it will drop a very malicious payload which "locks" your computer and asks for a ransom sometimes lying, like you can see in the picture or sometimes being honest and true like the CryptoLocker. Admitting that the program encrypted your files and if you want them back you need to pay a ransom. Ransomware can be also downloaded by force from Drive-By Downloads. Some ransomware can be really easy to remove, for example if it modifies the Windows Shell or Add registry keys to boot up with the OS but if the malware over-writes the Master Boot Record, you could be in a jam.
Ransomware is also responsible for suicide - news.softpedia.com/news/Romanian-Man-Commits-Suicide-After-Police-Ransomware-Tells-Him-He-Must-Pay-Fine-431882.shtml

If you are having problems with Ransomware you can always watch Rogueamp videos or contact him - https://www.youtube.com/channel/UCzuKOJtTTVCxWgi1SM8Kg6g

Backdoor
A Backdoor is a method of bypassing a computers security system(or a servers) and gaining access to it without permission and remaining undetected.
Most of the backdoors carry the payload of a RAT or a botnet in these days although back in the days the MyDoom Worm installed a backdoor which allowed to create DDOS attacks.
A Backdoor webshell is another example where the attacked used PHP code format to gain remote control of computers.
A backdoor could allow a lot of functions as it takes over the computer, such as keylogging, browser hijacking, browser stealing, File Transfer, File Execution and so on, but a backdoor could be a trojan a virus and a worm.

Downloader

A Downloader is a type of malware that is useally an addition to the originaly downloaded malware but it could work as a standalone, a Downloader downloads additional malware to the system.
The "Download And Execute" Option in botnets and RATS can be also labeled as a downloader but in cases such as in a Conflicker infection, it would update itself to a newer variant of itself each time.

Pictures and shit
- Gruel worm

- CrpytoLocker

- ILOVEYOUWORM arriving in an email, on execution it would mass email itself and then overwrite un-critical files on the computer, due to its easy modified nature, new variants of the worm over written critical system files.

http://www.youtube.com/watch?v=3GAMFERRs1k- LOVEYOU trojan who deleted critical system files as a payload after it stressed the user.

TODO List:

Ransomware
launcher
backdoor
downloader
rootkit
rogue
spam-sending malware
spyware

« Last Edit: April 15, 2014, 10:48:38 pm by Danus »

Offline euroz33

  • /dev/null
  • *
  • Posts: 5
  • Cookies: -2
    • View Profile
that crypto is a awesome idea whoever did it!

Offline Phage

  • VIP
  • Overlord
  • *
  • Posts: 1280
  • Cookies: 120
    • View Profile
Could/Should be updated with more in-depth/advanced explanations on how the different kinds of malware actually works. Not talking about a book, but I feel like a lot more could be added without making it too long.
"Ruby devs do, in fact, get all the girls. No girl wants a python, but EVERY girl wants rubies" - connection

"It always takes longer than you expect, even when you take into account Hofstadter’s Law."

Offline Deque

  • P.I.N.N.
  • Global Moderator
  • Overlord
  • *
  • Posts: 1203
  • Cookies: 518
  • Programmer, Malware Analyst
    • View Profile
There are indeed inaccuracies in the definitions.
@Danus: Back your paper up with some legit resources and try to be more accurate. The way it is now is confusing for the reader.
Some examples:

Quote
unlike a virus worms do not modify files and destroy them [...]
Gruel worm for example arrived in an email with a very malicious payload, once activated it would mass email itself and then remove files from System32

Quote
worms do not need human existence to work

E-Mail worms do! They can not run without the user opening the e-mail.

If you look into "the art of computer virus research and defense" you will find that worms are categorized as a subtype of virus there.
Szor defines them this way: "Worms are network viruses, primarily replicating on networks." and he states that they typically don't need a host file or user interaction. Note the word "typically".
Quote
The difference between other malware and a trojan is that a Trojan doesnt replicate itself or attempt to spread itself or need human action to exist.

A trojan always needs human interaction. There has to be someone bringing the horse into the city. Or in terms of a computer trojan: There has to be a user who downloads and executes the trojan.

Quote
A trojan is a Keylogger, A  trojan is a backdoor.

A trojan is not necessarily either of them.
This has nothing to do with each other. You can spread every kind of malware as trojan and you can almost always do it in another way.

Also here are some more malware types you might want to include:

scareware
information-stealing malware
launcher
backdoor
downloader
rootkit
spam-sending malware

You can also classify malware into mass malware and targeted malware.
« Last Edit: April 04, 2014, 12:50:30 pm by Deque »

Offline Danus

  • Serf
  • *
  • Posts: 39
  • Cookies: 24
  • Jewish Coder
    • View Profile
There should be really notifications when someone comments to my thread.

Offline Architect

  • Sir
  • ***
  • Posts: 428
  • Cookies: 56
  • STFU
    • View Profile
    • Rootd IRC
Bump.
Also nope just learn how to watch your threads better. It's easy, you'll get the hang of it.

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
That's what those links under your profile on the top right are for.
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline iTpHo3NiX

  • EZ's Pirate Captain
  • Administrator
  • Titan
  • *
  • Posts: 2920
  • Cookies: 328
    • View Profile
    • EvilZone
Great foundation +1 now we need to (as a community) expand on this and have the OP update the thread.

Rootkits are the main thing missing from this section. I just removed a rootkit from one of my bosses computers (cidox) which wouldn't even enable you to boot into the system.

Also to elaborate and go further with this thread is how to disinfect various common malware people encounter and to stop them from spreading.

This could make for an excellent wiki page(s)
[09:27] (+lenoch) iTpHo3NiX can even manipulate me to suck dick
[09:27] (+lenoch) oh no that's voluntary
[09:27] (+lenoch) sorry

Offline Danus

  • Serf
  • *
  • Posts: 39
  • Cookies: 24
  • Jewish Coder
    • View Profile
I added Ransomware and scareware, this is the todo list :

launcher
backdoor
downloader
rootkit
rogue
spam-sending malware