Antivirus Evasion Flashcards
1
Q
Heuristic-Based Detection
A
- relies on rules and algorithms to determine whether an action is considered malicious
- this is often achieved by stepping through the instruction set of a binary file or by attempting to decompile and then analyze the source code.
- the idea is to look for various patterns and program calls that are considered malicious
2
Q
Behavior-Based Detection
A
- dynamically analyzes the behavior of a binary file
- this is often achieved by executing the file in an emulated environment, such as a small virtual machine, and look for behaviors or actions that are considered malicous
3
Q
Cypters
A
- On-Disk Evasion technique
- cryptographically alters executable code, adding a decrypting stub that restores the original code upon execution.
- this decryption happens in-memory, leaving only the encrypted code on-disk.
- Encryption has become foundational in modern malware as one of the most effective AV evasion techniques
4
Q
In-Memory AV Evasion
A
- aka PE Injection
- focuses on the manipulation of volatile memory
- one of the main benefits of this technique is that it does not write any files to disk
5
Q
What is PowerShell In-Memory Injection?
A
- a powerful feature of PowerShell is that it can interact with the Windows API
- this allows us to implement the in-memory injection process in a PowerShell script
- executing a PowerShell script for in-memory injection makes it difficult for AV to determine if the script is malicious or not since it is run inside an interpreter and the script itself isn’t executable code
6
Q
What is Shellter?
A
- a dynamic shellcode injection tool
- it uses a number of novel and advanced techniques to essentially backdoor a valid and non-malicious executable file with a malicious shellcode payload
- it performs an analysis of the target PE file and the execution paths
- it then determines where it can inject the shellcode, without relying on traditional injection techniques that are easily caught by AV engines
- Shellter attempts to use the existing PE Import Address Table (IAT) entries to locate functions that will be used for the memory allocation, transfer, and execution of our payload
7
Q
How do you run Shellter?
A
- sudo apt install shellter
- apt install wine