Malware Behaviors and Indicators

Key Takeaways

  • Malware questions usually test behavior, impact, indicators, and the best containment or mitigation.
  • Ransomware encrypts or steals data for extortion; worms self-propagate; Trojans hide malicious functions inside apparently useful software.
  • Fileless malware abuses trusted tools such as scripting engines and memory-resident execution to reduce disk artifacts.
  • Rootkits and bootkits focus on stealth and persistence, while spyware and keyloggers focus on collection.
  • Good indicators include process behavior, network beacons, persistence changes, file modifications, and authentication anomalies.
Last updated: April 2026

Malware Behaviors and Indicators

Malware is tested by behavior more than by vocabulary. Read the scenario for what the code does: encrypts files, steals credentials, hides itself, spreads without help, opens remote control, or abuses a trusted process.

Malware typePrimary behaviorCommon indicatorsFirst mitigation focus
VirusAttaches to files and needs executionModified files, unexpected hash changesRemove infected files, restore clean copies
WormSelf-propagates across systemsRapid scanning, repeated connection attemptsSegment, block propagation path, patch flaw
TrojanPretends to be legitimate softwareUnknown app, unexpected outbound sessionsRemove app, reimage if trust is lost
RansomwareEncrypts and may exfiltrate dataFile renames, ransom note, mass write activityIsolate host, disable compromised account, preserve evidence
SpywareSecretly collects user or system dataBrowser changes, unusual data uploadsRemove software, review privacy and endpoint controls
KeyloggerCaptures keystrokes or form dataCredential theft, suspicious input hooksReset exposed credentials from a clean device
RootkitHides processes, files, or privilegesSecurity tool blind spots, kernel anomaliesRebuild from trusted media when integrity is uncertain
Backdoor/RATProvides unauthorized remote accessBeaconing, new listener, remote shell activityBlock C2, isolate host, rotate credentials
Logic bombTriggers on a conditionTimed or event-based destructive actionCode review, change control, remove trigger
CryptominerUses resources for miningHigh CPU/GPU, pool connectionsRemove process, close initial access vector

Behavior Patterns

BehaviorWhat it suggests
Mass file encryptionRansomware or destructive malware
Credential access from memory or browsersInfostealer, Trojan, post-exploitation tool
Scheduled task or run key creationPersistence
PowerShell or shell downloads encoded contentFileless malware or staged payload
DNS queries to odd domains at fixed intervalsCommand-and-control beaconing
Lateral movement with admin sharesCompromised privileged credentials

Worked Scenario

A workstation logs these events:

TimeEvidence
09:12User opens invoice_viewer.exe from email attachment
09:13powershell.exe starts with encoded command line
09:14Dozens of documents renamed with a new extension
09:15File server logs show the same user modifying shared files

The behavior points to ransomware delivered by a Trojan-like attachment, followed by script execution and file share impact. The best immediate action is containment: isolate the endpoint, disable or reset the compromised account, and stop access to affected shares. Recovery from backups comes after containment and eradication.

Common Traps

TrapBetter exam reasoning
"Run antivirus only" while malware is spreadingContain first if active spread is confirmed
"Restore backups" before the infection path is closedRecovery can be reinfected if root cause remains
"Delete logs" to save disk spacePreserve evidence and timeline data
"Assume rootkit can be cleaned safely"Rebuild from trusted media if system integrity cannot be trusted

Quick Drill

For each clue, name the likely behavior:

  1. Hundreds of connection attempts to TCP 445 across subnets: worm-like propagation or lateral movement.
  2. Browser sessions are normal, but credentials are used from a new country minutes later: credential theft or keylogging.
  3. A server sends small encrypted packets to one external host every 60 seconds: beaconing to command and control.
  4. Security tools cannot see a process that network logs prove is communicating: possible rootkit or tampering.
Test Your Knowledge

A workstation suddenly renames thousands of files and writes a note demanding payment. What malware behavior is most likely?

A
B
C
D
Test Your Knowledge

An analyst confirms a host is actively encrypting shared folders. What should be done first?

A
B
C
D
Test Your KnowledgeMulti-Select

Which indicators most strongly suggest command-and-control activity? Select two.

Select all that apply

Periodic outbound connections to an unusual domain
A user opening a local text file
DNS requests with encoded-looking subdomains
A printer running out of paper