Defeat Evasive Malware

Get the whitepaper

3 ways malware evades analysis

For malware analysis to truly be effective, Incident Responders and Malware Analysts need to have confidence that they are getting full, accurate results during sandbox analysis. Malware authors use 3 categories of techniques to conceal the real behavior of malicious files and evade analysis.
Our researchers have examined in detail these 3 approaches used to evade analysis. By reading this whitepaper you’ll gain a better understanding of evasion techniques that:

ACTIVELY DETECT THE ANALYSIS ENVIORNMENT

EXPLOIT SANDBOX WEAKNESSES

USE TIME, EVENT OR ENVIRONMENT BASED TRIGGERS

This whitepaper is based on the work of our research team, led by our co-founders, two pioneering experts in the field of dynamic binary analysis.

Dr. Carsten Willems

Co-Founder

Dr. Ralf Hund

Co-Founder

Days
Hours
Minutes
Seconds

Ready to stress-test your malware sandbox? Join us for a no-fluff, all-demo webinar that shows you real techniques to evaluate and optimize your sandboxing solution!