What are the different evasion techniques used by malware?

Malware Analysis Questions Medium



80 Short 80 Medium 48 Long Answer Questions Question Index

What are the different evasion techniques used by malware?

Malware authors employ various evasion techniques to avoid detection and analysis by security systems. Some common evasion techniques used by malware include:

1. Polymorphism: Malware uses polymorphic techniques to constantly change its code structure, making it difficult for antivirus software to detect and identify the malware based on signature matching.

2. Encryption: Malware may encrypt its code or payload to make it unreadable and prevent detection by security systems. Encryption techniques can include symmetric or asymmetric encryption algorithms.

3. Obfuscation: Malware authors use obfuscation techniques to hide the true intent and functionality of the code. This can involve adding unnecessary code, using code obfuscators, or employing anti-analysis techniques to confuse and hinder reverse engineering efforts.

4. Rootkit functionality: Some malware incorporates rootkit functionality to gain privileged access and hide its presence within the operating system. Rootkits can manipulate system calls, modify kernel data structures, or intercept system functions to conceal the malware's activities.

5. Anti-VM/Anti-sandbox techniques: Malware can detect if it is running within a virtual machine or sandbox environment commonly used for analysis. It may alter its behavior or remain dormant to avoid detection or analysis by security researchers.

6. Code injection: Malware can inject its code into legitimate processes or system components to blend in and evade detection. By residing within trusted processes, it becomes more challenging to identify and isolate the malicious code.

7. Fileless malware: Fileless malware operates in memory without leaving traces on the disk, making it difficult to detect using traditional file-based scanning techniques. It leverages legitimate system tools and processes to carry out its malicious activities.

8. Steganography: Malware can hide its code or payload within seemingly harmless files, such as images or documents, using steganography techniques. This allows the malware to evade detection by security systems that primarily focus on file signatures.

9. Dynamic DNS: Malware may use dynamic DNS services to constantly change its command-and-control (C2) server's IP address, making it challenging for security systems to block or track the malware's communication with its C2 infrastructure.

10. Time-based triggers: Malware can employ time-based triggers to delay its execution or change its behavior, making it harder to detect and analyze. By remaining dormant or altering its actions based on specific time intervals, it can evade detection by security systems that rely on static analysis techniques.

It is important for malware analysts and security professionals to stay updated with the latest evasion techniques employed by malware to effectively detect, analyze, and mitigate the threats posed by malicious software.