For malware analysis to truly be effective, Incident Responders and Malware Analysts need to have confidence that they are getting full, accurate results during sandbox analysis. Malware authors use 3 categories of techniques to conceal the real behavior of malicious files and evade analysis.
Our researchers have examined in detail these 3 approaches used to evade analysis. By reading this whitepaper you’ll gain a better understanding of evasion techniques that:
ACTIVELY DETECT THE ANALYSIS ENVIORNMENT
EXPLOIT SANDBOX WEAKNESSES
USE TIME, EVENT OR ENVIRONMENT BASED TRIGGERS
This whitepaper is based on the work of our research team, led by our co-founders, two pioneering experts in the field of dynamic binary analysis.