A multinational corporation's computer system was infiltrated by an advanced persistent threat (APT). During forensic analysis, it was discovered that the malware was utilizing a blend of two highly sophisticated techniques to stay undetected and continue its operations.
Firstly, the malware was embedding its harmful code into the actual binary or executable part of genuine system files rather than appending or prepending itself to the files. This made it exceptionally difficult to detect and eradicate, as doing so risked damaging the system files themselves.
Secondly, the malware exhibited characteristics of a type of malware that changes its code as it propagates, making signature-based detection approaches nearly impossible.
On top of these, the malware maintained a persistent presence by installing itself in the registry, making it able to survive system reboots.
Given these distinctive characteristics, which two types of malware techniques does this malware most closely embody?
e020fdc
2Â months, 4Â weeks agoagelbahri
5Â months, 1Â week agoskorek31
6Â months, 2Â weeks ago49f4430
8Â months, 3Â weeks agoLordXander
10Â months, 2Â weeks agoLordXander
10Â months, 1Â week agoanarchyeagle
11Â months, 3Â weeks agoqwerty100
1Â year agoqtygbapjpesdayazko
11Â months agoxbsumz
1Â year agoinsaniunt
1Â year ago