CMT118 Malware Analysis and Vulnerability Assessment
Malware Analysis and Vulnerability Assessment
Module Code: CMT118
Module Title: Malware Analysis and Vulnerability Assessment
This assignment is worth 100% of the total marks available for this module. If coursework is
submitted late (and where there are no extenuating circumstances):
1 If the assessment is submitted no later than 24 hours after the deadline,
the mark for the assessment will be capped at the minimum pass mark;
2 If the assessment is submitted more than 24 hours after the deadline, a
mark of 0 will be given for the assessment.
Your submission must include the official Coursework Submission Cover sheet, which can be
found here:
Submission Instructions
There are two Tasks in this coursework: Task 1 (T1) is on Malware Analysis and Task 2 (T2) is
on Vulnerability Assessment. In addition to the official Coursework Submission Cover sheet
(see above), you should submit two reports (PDF or Word file).
Description Type Name
Cover sheet Compulsory One PDF (.pdf) file [student number].pdf
T1 report Compulsory One PDF (.pdf) or Word file (.doc or
.docx)
T1_[student number].pdf/doc/docx
T2 report Compulsory One PDF (.pdf) or Word file (.doc or
.docx)
T2_[student number].pdf/doc/docx
Any deviation from the submission instructions above (including the number and types of
files submitted) will result in a 10% reduction in marks for the corresponding Task.
Staff reserve the right to invite students to a meeting to discuss coursework submissions
Assignment
There are two Tasks in this coursework: T1 is to analyse malware and it is worth 30 marks. T2
is to test a vulnerable Virtual Machine image and it is worth 70 marks.
For T1, you will be given access to two pieces of malware. You will analyse both and write a
report with your conclusions. You should submit your report as a PDF or Word file. The report
should be at most 1000 words. Anything beyond the first 1000 words will not be marked.
For T2, you will be given two VM images: one is a Kali Linux VM from which you will conduct
your attacks against the other VM (Ubuntu Linux), which contains at least 7 vulnerabilities.
Your task is to follow a systematic process to find and exploit the vulnerabilities in the Ubuntu
VM, propose fixes for the vulnerabilities that you find, and finally write a report with your
findings and your recommendations. You should submit your report as a PDF or Word file. In
total, the report should be at most 3000 words. Anything beyond the first 3000 words will
not be marked.
Learning Outcomes Assessed
1. Perform static and dynamic malware analysis to explain the malware’s anatomy, its
effects on a system and its spreading behaviour.
2. Identify, evaluate, and recommend, with justification, a selection of configurations
and countermeasures to reduce the likelihood and impact of potential security
attacks.