Paper: The Journey of Evasion Enters Behavioural Phase

Anti-detection techniques are almost as old as malware itself and have developed well beyond hash busting techniques. As security products adapt their detection tools, malware authors need to find new ways to prevent their malware from being blocked while it is running.

In a new

paper

(also available as

PDF

) published today by

Virus Bulletin

,

FireEye

researcher Ankit Anubhav looks at a number of such techniques that were found in recent malware samples, from hiding malicious code called by

Office

macros in form fields to renaming the

Windows

StartUp folder to maintain persistence in a less obvious way.

Figure4-Anubhav.jpg


Posted

in

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *