In this meet, Monnappa K A delivered presentation on “Understanding Malware Persistence Techniques”
Demo 1 – Understanding the IFEO Technique
Demo 2 – Malware Using IFEO (Trojan.Zusy)
Demo 3 – Simple Anti-Analysis Using IFEO (Trojan.Small)
Demo 4 – Simple Anti-Analysis using IFEO (Brontok Worm)
Demo 5 – Winlogon Persistence (Turla gazer backdoor)
Demo 6 – Persistence Through Accessibility Programs (Trojan Occamy)
Demo 7 – Persistence Through AppInit DLLs (T9000 APT Backdoor)
Demo 8 – DLL Search Order Hijacking