Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Malware Techniques: Code Streaming

$
0
0
This quick post will cover the topic of code streaming. For example, take malware. One way for malware to hide and persist on a system is to not contain any malicious code. This is done by getting the malicious payload through an external source, such as a direct request to a web server, a Twitter/social media post, a Pastebin, or any other common mechanism. This code, usually encrypted or obfuscated in some way, is then mapped in to the malicious process and executed. After execution, the memory region is cleaned up and reused or reallocated in order to carry out further malicious functionality.

more here.........http://www.codereversing.com/blog/?p=194

Viewing all articles
Browse latest Browse all 8064

Trending Articles