com

In our recent blog post Blinding Malware Analysis with COM Objects we talked about the steady trend of malware using Microsoft s Component Object Model COM for evading sandbox analysis The reason why COM can be used to perform stealth operations is that traditional dynamic analysis systems monitor program behavior
COM Introduction The Component Object Model COM is quite an old technology that was introduced by Microsoft in the early 90s It allows the development and usage of binary software components in a language and architecture independent way To this end COM classes are provided by COM servers and can

Uncover the truth of Cybersecurity, one story at a time

Keep up to date with our weekly digest of articles. Get the latest news, invites to events, and threat alerts!

Subscribe to our Newsletter