From the course: Ethical Hacking: The Complete Malware Analysis Process

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Considering malware in families

Considering malware in families

From the course: Ethical Hacking: The Complete Malware Analysis Process

Start my 1-month free trial

Considering malware in families

- [Instructor] Malware tends to come in families. In the beginning, a new set of source code is written to deliver one instance of malware, and new versions of this may be released as its writers add features and counter detection. Ero Carrera and Peter Silberman from MANDIANT have analyzed many malware samples, and their research shows the complexity, but also the family clustering of malware seen on the internet. In the research paper, "An Empirical Study of Malware Evolution" by Archit Gupta and his colleagues, the family tree of the W32/Bagle malware was analyzed. The results show that the Bagle malware instances were spread across 14 different families. The biggest among the families is shown here and has 36 nodes, a depth of eight, and a maximum fanout of five. There were a number of common phrases in this malware family including addresses spoofed, worm opens, mail propagation, copies itself to folders, and so on. In addition, the Bagle variants copied themself to the same…

Contents