|12 Jan 2010||#1|
| || |
As already discussed by Mike, malware authors love to innovate when it comes to persistence and hiding their nefarious creations from detection, and although most of the schemes are not unknown to analysts, they still show that malware authors are constantly on the prowl and evolving their techniques.
The example I have is of yet another registry-centric malware which by the nature of its construction has several advantages to defeating naive security software. The sample, detected as Troj/RegExec-A, is essentially a multi-component threat of sorts comprising of at least 3 components (Dropper/installer, Payload and Loader.)
|My System Specs|
|Similar help and support threads for2: Registered malware.|
|Malware-splosion: 2013 Will be Malware's Biggest Year Ever||Security News|
|Notification .DLL has not been registered.||Performance & Maintenance|
|Class Not Registered||Software|
|Registered JIT Debugger Not Available||Software|
|Class is not registered. [NEED HELP]||Music, Pictures & Video|
|Malware Removal Guide 2011: How to Get Rid of All The Latest Malware||Security Basics|
|Interface not registered||Music, Pictures & Video|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 09:44 AM.