Defeat Evasive Malware

Get the whitepaper

3 ways malware evades analysis

For malware analysis to truly be effective, Incident Responders and Malware Analysts need to have confidence that they are getting full, accurate results during sandbox analysis. Malware authors use 3 categories of techniques to conceal the real behavior of malicious files and evade analysis.
Our researchers have examined in detail these 3 approaches used to evade analysis. By reading this whitepaper you’ll gain a better understanding of evasion techniques that:

ACTIVELY DETECT THE ANALYSIS ENVIORNMENT

EXPLOIT SANDBOX WEAKNESSES

USE TIME, EVENT OR ENVIRONMENT BASED TRIGGERS

This whitepaper is based on the work of our research team, led by our co-founders, two pioneering experts in the field of dynamic binary analysis.

Dr. Carsten Willems

Co-Founder

Dr. Ralf Hund

Co-Founder