Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

How Malware Generates Mutex Names to Evade Detection

$
0
0
Malicious software sometimes uses mutex objects to avoid infecting the system more than once, as well as to coordinate communications among its multiple components on the host. Incident responders can look for known mutex names to spot the presence of malware on the system. To evade detection, some malware avoids using a hardcoded name for its mutex, as is the case with the specimen discussed in this note.

more here..........https://isc.sans.edu/diary/How+Malware+Generates+Mutex+Names+to+Evade+Detection/19429

Viewing all articles
Browse latest Browse all 8064

Trending Articles