Futaba _ Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

The Virus Archetype πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Today we are going to be talking about the many malware types that exist. As many of you know, I LOVE writing malware and various penetration testing tools, as well as reverse engineering them in order to see what techniques I can pluck off from them.

πŸŽƒ Article πŸŽƒ Glossary πŸŽƒ Catalog πŸŽƒ Home πŸŽƒ Search Mode

πŸŽƒ Article Glossary

πŸ•Έ Synopsis πŸ•Έ

Today we are going to be talking about the many malware types that exist. As many of you know, I LOVE writing malware and various penetration testing tools, as well as reverse engineering them in order to see what techniques I can pluck off from them.

Disclaimer

As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, let's begin!

πŸ•Έ Article Topics πŸ•Έ

I'll be discussing the following topics in order:

πŸŽƒ Premise

πŸŽƒ What is Malware?

πŸŽƒ Polymorphic Virus

πŸŽƒ Armored Virus

πŸŽƒ Retrovirus

πŸŽƒ Phage Virus

πŸŽƒ Companion Virus

πŸŽƒ Crypto-Malware

πŸŽƒ Hybrid Virus

πŸŽƒ Meramorphic Virus

πŸŽƒ Cavity Virus

πŸŽƒ Keylogger

πŸŽƒ Spyware

You can click on any of the topics to simply check that one out if it interests you!

NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!

πŸ•Έ Key Links πŸ•Έ

Here's a quick run down on all the main links that are in the article in case you want to check them out first.

πŸŽƒ LinkedIn Version

πŸŽƒ GitHub

πŸŽƒ Bash Script

πŸŽƒ The Virus Archetype

Premise πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Sadly, because there are so many, I can’t talk about all of them otherwise the article would be 7 pages long, so instead, I’ll talk about a select few.

If you would like to get more into malware development and learn a couple of projects, check out some samples on my GitHub page. Any and all code is well commented and documented, so you should have no trouble understanding what each line does.

My GitHub

What is Malware? πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Malware is any form of program that is designed for malicious reasons to infect and harm a system. It can come in many types and affect the system in various ways.

Polymorphic Virus πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Polymorphic viruses have the ability to mask their own code by means of encryption. This is a form of obfuscation technique that can also be used in order to avoid detection from various security systems, which can also allow the malware to command and control via communication with the bot master SECURELY.

As you know, computer systems, much like a human, are UNABLE to decipher data encryption. It comes up as garble to them. This allows the malware to remain invisible and not trigger any flags set by security systems.

Armored Virus πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Armored malware focuses on defensive measures that make it hard to remove. A good example of this would be boot infector rootkits, that embeds itself in the master boot records of the system, proving to be fatal if you try to remove them.

Retrovirus πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Retroviruses are designed to neutralize any form of antivirus system set in place. They are the anti-virus for anti-virus. If you shut off any form of security system in place you basically CREATE a zero day where EVERYTHING goes undetected.

Phage Virus πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Phage Viruses, also known as β€œworm” viruses, are standalone viruses that can operate independent of the person who wrote it. It’s typically used to infect various networks and run on its own, branching out.

Companion Virus πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

This is where Trojan malware comes from. Companion malware is designed to pose as legitimate software on the system, tricking the end user into executing it to compromise their system. It can be stuff like: RAT(Remote Access Trojan), MITB(Man-In-The-Browser), etc. This is a common form of malware that is even used in phishing tactics CONSISTENTLY.

Crypto-Malware πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

This is Ransomware. It’s any form of malware that utilizes data encryption in order to compromise a system by enumerating the disk partitions and applying encryption at rest in order to render end user data infeasible, requiring them to pay a ransom in order to restore their data.




Hybrid Virus πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Hybrid malware, another common form of malware, focuses on combining several characteristic traits from other forms of malware.

This can be deadly, for example, if it were a worm virus that acts on it’s own and can encrypt and protect itself, as well as re-write it’s own code.

Meramorphic Virus πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

One of the HARDEST forms of malware to write, but EXTREMELY POWERFUL, this form of malware is able to re-write its own code, allowing it to adapt when needed. Think of this form of malware like β€œDarwinism”

Cavity Virus πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

This is any form of malware that uses steganography tactics, which is commonly seen in Trojan malware. Steganography is the art of masking other data within other forms of data.

Here is a sample snippet of code, which you can copy and paste into a bash file and test out if you would like

The script can be found here in my bash repo

If you try to unzip this file on it's own while it's encoded, you’ll notice that it doesn't work and it is registered as a β€œTEXT/ASCII” file type. If this were a system that does NOT allow zip folders to be uploaded, you can bypass security this way, and smuggle the malware in.

Keylogger πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Keyloggers as the name would suggest, monitor all keys that are typed. This is typically used to POST data back to threat actor servers to steal sensitive information.

Spyware πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Spyware monitors and collects data about various systems without the end-users knowledge/consent. This a form of stealth virus (Looks at Windows)


If you enjoyed this post give it a thumbs up! I’ll be keeping track of whose reacting from now on as there is a β€œspecial” reason for it. Just know the more you support my content the more there is in stored!


- The Hacker Who Laughs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

portfolio img

πŸŽƒ CONTACT ME

AnOnYmOuS

futaba.webs@gmail.com

New York, NY United States