For malware analysis to truly be effective, Incident Responders and Malware Analysts need to have confidence that they are getting full, accurate results during sandbox analysis. Malware authors use 3 categories of techniques to conceal the real behavior of malicious files and evade analysis.
Our researchers have examined in detail these 3 approaches used to evade analysis. By reading this whitepaper you’ll gain a better understanding of evasion techniques that:
ACTIVELY DETECT THE ANALYSIS ENVIORNMENT
EXPLOIT SANDBOX WEAKNESSES
USE TIME, EVENT OR ENVIRONMENT BASED TRIGGERS
This whitepaper is based on the work of our research team, led by our co-founders, two pioneering experts in the field of dynamic binary analysis.
Ready to stress-test your malware sandbox? Join us for a no-fluff, all-demo webinar that shows you real techniques to evaluate and optimize your sandboxing solution!