From the course: Ethical Hacking: The Complete Malware Analysis Process

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Hiding malware

Hiding malware

From the course: Ethical Hacking: The Complete Malware Analysis Process

Start my 1-month free trial

Hiding malware

- [Instructor] Early malware was written as any other software with code designed just to achieve the exploit and install or execute a payload. However, once the malware had been detected on a target, antivirus companies soon created a signature for the malware and installed it in their products. The next target was then able to defeat the malware by detecting it before it had a chance to execute. Another problem was that malware tends to have distinct types of coding structures, meaning that even without a signature, a good antivirus product can detect likely malware and quarantine it for further inspection. Malware writers soon worked out a range of techniques to avoid being defeated even if the malware had previously been detected. An early approach that became popular was obfuscation, for example masking the executable code by XORing it and including a small routine to recover the executable code at the start of the malware. In 2003, a buffer overflow was found in the Microsoft…

Contents