What viruses can change its own code to avoid detection?

Macro Virus: These type of virus infects word, excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.

Master boot record files: MBR viruses are memory-resident viruses and copy itself to the first sector of a storage device which is used for partition tables or OS loading programs .A MBR virus will infect this particular area of Storage device instead of normal files. The easiest way to remove a MBR virus is to clean the MBR area,

Boot sector virus: Boot sector virus infects the boot sector of a HDD or FDD. These are also memory resident in nature. As soon as the computer starts it gets infected from the boot sector.  Cleaning this type of virus is very difficult.

Multipartite virus: A hybrid of Boot and Program/file viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then start infecting other program files on disk

Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.

Stealth viruses: These types of viruses use different kind of techniques to avoid detection. They either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For example, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory.

Which type of virus can change its own code and then cipher itself multiple times as it replicates?

  • A. Stealth virus
  • B. Tunneling virus
  • C. Cavity virus
  • D. Encryption virus

Show Suggested Answer Hide Answer

Suggested Answer: A 🗳️

by Mdean at April 5, 2021, 11:03 a.m.

Comments

Mdean

Highly Voted 1 year, 4 months ago

Stealth or Tunneling Virus should not be the right answer. It should be Polymorphic or metamorphic virus which is not an option. Stealth viruses try to hide from antivirus programs by actively altering and corrupting the service call interrupts while running. The virus code replaces the requests to perform operations with respect to these service call interrupts. Thoughts?

upvoted 27 times

True, really expected to have Metamorphic/Polymorphic as an Option

upvoted 10 times

...

Here is an example definition that allows Stealth virus to be acceptable in this situation. Not the best answer, but the only one that is close enough to fit: "...a stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software. Generally, stealth describes any approach to doing something while avoiding notice"

upvoted 6 times

...

...

cefibo

Highly Voted 1 year, 1 month ago

Encryption Virus: " The replication process is successfully accomplished using the encryptor. Each virus-infected file uses a different key for encryption. Encryption viruses block access to target machines or provide victims with limited access to the system. They use encryption to hide from virus scanners. The virus scanner cannot detect the encryption virus using signatures" From CEH

upvoted 13 times

Here I will disagree with U. The question includes: "can change its own code". Encryption does nothing with the virus code. It just encrypts it, and after some trigger decrypts it and the virus runs. Change of the key does nothing to the source code of virus, just changes the "presentation" form in encrypted state. I will definitely go with Poly/MetaMorphic ones but with provided answers Stealth fits better.

upvoted 2 times

...

...

Kratak

Most Recent 1 week, 6 days ago

A stealth virus usually enters the system via infected web links, malicious email attachments, third-party application downloads, etc. The virus tricks the system to get past an antivirus program using two primary methods: 1. Code modification. To avoid detection, the virus modifies the code and virus signature of every infected file. 2. Data encryption. The virus renders the affected file inaccessible or unreadable to the user by encrypting it and also by using a different encryption key for different files. Therefore answer is Stealth virus

upvoted 2 times

...

A is correect

upvoted 1 times

...

Selected Answer: A

..a stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software. Generally, stealth describes any approach to doing something while avoiding notice

upvoted 1 times

...

Encryption virus to ECCouncil is equal to Ransonware, so D is not the correct answer

upvoted 2 times

...

jijin

3 months, 1 week ago

Selected Answer: A

https://www.techopedia.com/definition/4130/stealth-virus#:~:text=In%20order%20to%20avoid%20detection,key%20for%20each%20infected%20file.

upvoted 1 times

...

According to Viktor Afimov (Udemy's CEHv11 Exam dumps) Encryption virus is just another name for Ransomware, as it encrypts the victim's files and folders.

upvoted 2 times

...

Selected Answer: D

correct

upvoted 1 times

...

Selected Answer: D

The correct answer should be D - Encryption Virus

upvoted 1 times

...

Selected Answer: D

The correct answer should be D - Encryption Virus Encryption viruses consist of encrypted copy of the virus and decryption module. First the decryption module decrypt the virus body. When virus tries to replicate and infect other files it will again use encryption using different encryption keys.

upvoted 2 times

...

Qudaz

6 months, 3 weeks ago

A stealth virus is also named a tunneling virus. It does not change its own code rather it takes control of the systems functions and changes them. Answer can not be A or B. the most suitable answer is Encryption from the list given.

upvoted 2 times

...

Ans:D. Encryption virus pg.938 CEHv11

upvoted 3 times

...

Selected Answer: D

D is correct

upvoted 2 times

...

+1 for Encryption, accordint to the CEHv11 materials

upvoted 4 times

...

Stealth viruses hide altered computer data and other harmful control functions in system memory and self-copy to undetectable computer areas, effectively tricking anti-virus software. In order to avoid detection, stealth viruses also self-modify in the following ways: Code Modification: The stealth virus changes the code and virus signature of each infected file. Encryption: The stealth virus encrypts data via simple encryption and uses a different encryption key for each infected file.

upvoted 1 times

...

according to the official material is D. Module 07 - Encryption Viruses

upvoted 6 times

...

What virus changes its code?

Stealth virus A stealth virus may be a sort of virus malware that contains sophisticated means of avoiding detection by antivirus software. After it manages to urge into the now-infected machine a stealth viruses hides itself by continually renaming and moving itself round the disc.

Which type of virus can change its appearance to evade detection?

Definition of Polymorphic Malware Polymorphic malware is a type of malware that constantly changes its identifiable features in order to evade detection. Many of the common forms of malware can be polymorphic, including viruses, worms, bots, trojans, or keyloggers.

Which of the following types of virus is capable of changing its signature to avoid detection?

Polymorphic viruses: These viruses have the ability to change their own signature at the time of infection. These viruses are very complicated and are difficult to detect. Polymorphic viruses cannot be detected by the signature based antivirus.

What is it called when malware changes its code?

A metamorphic virus is a type of malware that is capable of changing its code and signature patterns with each iteration.