answersLogoWhite

0


Best Answer

To evade detection, during and after installation, malware uses five primary techniques.

Wrapping. This process attaches the malicious payload (the installer or the malware itself) to a legitimate file. When the legitimate file is installed, so is the malicious payload (which usually installs before the legitimate file does). Using static signatures to detect wrapper files is largely ineffective since new ones are easily and regularly created and often generates false positives. This technique is commonly used by Windows and OS X malware distributed via pirated software and P2P networks. IceFog is a well-known malware commonly wrapped with a legitimate-looking CleanMyMac application and used to target OS X users. On the Windows platform, OnionDuke has been used with legitimate Adobe installers shared over Tor networks to infect machines.

Obfuscation. This involves modifying high level or binary code it in a way that does not affect its functionality, but completely changes its binary signature. Obfuscation was originally used to protect legitimate software against reverse-engineering and piracy. Malware authors have adopted the technique to bypass antivirus engines and impair manual security research. Using XOR encoding is one way to do this. Hiding process and file names, registry entries, URLs and other useful information can significantly slow down the investigation/reverse engineering of new malware samples.

Packers. These software tools are used to compress and encode binary files, which is another form of obfuscation. At runtime, the packer, which is typically embedded with the malicious binary, will "unpack" the payload into memory and execute it. There are a handful of common packing mechanisms in use today such as UPX, PECompact, Armadillo and others. These techniques are extremely effective at circumventing static signature engines.

Anti-debugging. Like obfuscation, anti-bugging was originally created by software developers to protect commercial code from reverse-engineering. Anti-debugging can prevent a binary from being analyzed in an emulated environments such as virtual machines, security sandbox, and others. For example, the ZeroAccess malware implemented a self-debugging technique in order to block external debugging attempts. Another example is malware attempting to delay its execution (or sleep) for an extended period of time. This is useful for bypassing sandboxing solutions since these only keep binaries in an emulated environment for a specific period of time before classifying them as benign and releasing them to the network.

Targeting. This technique is implemented when malware is designed to attack a specific type of system (e.g. Windows XP SP 3), application (e.g. internet Explorer 10) and/or configuration (e.g. detecting a machine not running VMWare tools, which is often a telltale sign for usage of virtualization). Targeting ensures that the malware is only triggered and installed when specific conditions are met, which enables it to evade detection in sandboxes because they do not resemble the host being attacked.

User Avatar

Loyal Mayert

Lvl 10
2y ago
This answer is:
User Avatar
More answers
User Avatar

Roslyn Walter

Lvl 10
1y ago

If the anti-virus has real time protection enabled, crypt it with a file using n.t. packer or f.b.i binder, it should come out clean

This answer is:
User Avatar

User Avatar

Wiki User

13y ago

If the anti-virus has real time protection enabled, crypt it with a file using n.t. packer or f.b.i binder, it should come out clean

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

Hotfixing

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Malware authors have many ways to get around antivirus engines Which method would not be an effective technique?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Malware authors have many ways to get around antivirus engines. Which one of the following would not be an effective technique?

Malware authors have many ways to get around antivirus engines. Which one of the following would not be an effective technique?


Malware authors have many ways to get around antivirus engines. Which would not be an effective technique?

Hotfixing


What is the best free antivirus for a server?

There is no such thing as the "best antivirus". It is all based upon your personal preference. Also, since new viruses are coming out every day, antivirus companies are struggling to stay one step ahead of malware authors. No one antivirus program is going to detect every virus, partly due to human error in analyzing the virus and software bugs. If you need an antivirus program and don't want to spend money, I recommend downloading MalwareBytes, which is a free anti-malware program and it is VERY effective.


When using the technique of direct characterization authors often use?

when using the technique of direct characterization authors often use


Malware authors have many ways to get around antivirus engines. What would not be an effective technique?

To evade detection, during and after installation, malware uses five primary techniques.Wrapping. This process attaches the malicious payload (the installer or the malware itself) to a legitimate file. When the legitimate file is installed, so is the malicious payload (which usually installs before the legitimate file does). Using static signatures to detect wrapper files is largely ineffective since new ones are easily and regularly created and often generates false positives. This technique is commonly used by Windows and OS X malware distributed via pirated software and P2P networks. IceFog is a well-known malware commonly wrapped with a legitimate-looking CleanMyMac application and used to target OS X users. On the Windows platform, OnionDuke has been used with legitimate Adobe installers shared over Tor networks to infect machines.Obfuscation. This involves modifying high level or binary code it in a way that does not affect its functionality, but completely changes its binary signature. Obfuscation was originally used to protect legitimate software against reverse-engineering and piracy. Malware authors have adopted the technique to bypass antivirus engines and impair manual security research. Using XOR encoding is one way to do this. Hiding process and file names, registry entries, URLs and other useful information can significantly slow down the investigation/reverse engineering of new malware samples.Packers. These software tools are used to compress and encode binary files, which is another form of obfuscation. At runtime, the packer, which is typically embedded with the malicious binary, will "unpack" the payload into memory and execute it. There are a handful of common packing mechanisms in use today such as UPX, PECompact, Armadillo and others. These techniques are extremely effective at circumventing static signature engines.Anti-debugging. Like obfuscation, anti-bugging was originally created by software developers to protect commercial code from reverse-engineering. Anti-debugging can prevent a binary from being analyzed in an emulated environments such as virtual machines, security sandbox, and others. For example, the ZeroAccess malware implemented a self-debugging technique in order to block external debugging attempts. Another example is malware attempting to delay its execution (or sleep) for an extended period of time. This is useful for bypassing sandboxing solutions since these only keep binaries in an emulated environment for a specific period of time before classifying them as benign and releasing them to the network.Targeting. This technique is implemented when malware is designed to attack a specific type of system (e.g. Windows XP SP 3), application (e.g. Internet Explorer 10) and/or configuration (e.g. detecting a machine not running VMWare tools, which is often a telltale sign for usage of virtualization). Targeting ensures that the malware is only triggered and installed when specific conditions are met, which enables it to evade detection in sandboxes because they do not resemble the host being attacked.


Sometimes authors use characters to talk about something that has happened previously.This technique is an example?

epiphany


What technique do the authors of Rebecca and The Story of Augustus both use to get their advice across to readers?

Both authors utilize storytelling as a technique to convey moral lessons and advice to readers. Through engaging narratives and complex characters, the authors are able to present their perspectives on various themes and issues, allowing readers to reflect and draw their own conclusions from the stories.


What is the best free anti virus?

VIPRE هي شركة رائدة في توفير حلول أمان الإنترنت التي تحمي الشركات وموفري الحلول والمستخدمين المنزليين من التهديدات السيبرانية المكلفة والضارة. يتضمن VIPRE أمانًا شاملاً لنقطة النهاية والبريد الإلكتروني وتحليلًا للبرامج الضارة في الوقت الفعلي. q9r.us/zCEn5


What do authors use for indirect characterization?

Authors use the character's speech and thoughts for indirect characterization. Another technique they use so readers can infer what the character is like is interactions with other characters.


How antivirus software works?

An antivirus software package "searches a hard disk for viruses and removes any that are found." (Webopedia 2004). An antivirus would be useful on a network if a user intentionally or unintentionally allows a virus to execute onto the system. Most antivirus software packages have regular updates to ensure protection against the newest types of virus's, and can will scan a system to ensure it is virus free.


When using the technique of direct characterization authors often use to describe characters.?

When using direct characterization, authors directly state a character's traits or qualities through explicit descriptions, actions, or dialogue. This technique provides readers with clear insights into the character's personality and helps to actively shape their perceptions of that character.


Why do authors use stream of consciousness as a narrative technique?

it gives the reader deep insight into a narrator's interpretation of events in a raw and unpolished manner