Skip to content

Latest commit

 

History

History
33 lines (26 loc) · 1.5 KB

README.md

File metadata and controls

33 lines (26 loc) · 1.5 KB
ID OB0002
Created 1 August 2019
Last Modified 12 June 2023

Anti-Static Analysis

Behaviors and code characteristics that prevent or hinder static analysis of the malware. Simple static analysis identifies features such as embedded strings, header information, or file metadata. More involved static analysis involves the disassembly of the binary code.

  • Call Graph Generation Evasion B0010
  • Disassembler Evasion B0012
  • Data Flow Analysis Evasion B0045
  • Executable Code Obfuscation B0032
  • Executable Code Optimization B0034
  • Executable Code Virtualization B0008
  • Obfuscated Files or Information E1027
  • Software Packing F0001

References

[1] https://search.unprotect.it/category/sandbox-evasion/

[2] InDepthUnpacking, course content for teaching malware anti-analysis techniques and mitigations, with emphasis on packers. https://github.com/knowmalware/InDepthUnpacking