A multinational corporation's computer system was infiltrated by an advanced persistent threat (APT). During forensic analysis, it was discovered that the malware was utilizing a blend of two highly sophisticated techniques to stay undetected and continue its operations.
Firstly, the malware was embedding its harmful code into the actual binary or executable part of genuine system files rather than appending or prepending itself to the files. This made it exceptionally difficult to detect and eradicate, as doing so risked damaging the system files themselves.
Secondly, the malware exhibited characteristics of a type of malware that changes its code as it propagates, making signature-based detection approaches nearly impossible.
On top of these, the malware maintained a persistent presence by installing itself in the registry, making it able to survive system reboots.
Given these distinctive characteristics, which two types of malware techniques does this malware most closely embody?
agelbahri
2Â months agoskorek31
3Â months, 2Â weeks ago49f4430
5Â months, 3Â weeks agoLordXander
7Â months, 2Â weeks agoLordXander
7Â months, 1Â week agoanarchyeagle
8Â months, 3Â weeks agoqwerty100
9Â months agoqtygbapjpesdayazko
8Â months agoxbsumz
9Â months, 1Â week agoinsaniunt
9Â months, 1Â week ago