13th Quarterly Meetup – Understanding Malware Persistence Techniques

In this meet, Monnappa K A delivered presentation on “Understanding Malware Persistence Techniques”


Demo 1 – Understanding the IFEO Technique


Demo 2 – Malware Using IFEO (Trojan.Zusy)


Demo 3 – Simple Anti-Analysis Using IFEO (Trojan.Small)


Demo 4 – Simple Anti-Analysis using IFEO (Brontok Worm)


Demo 5 – Winlogon Persistence (Turla gazer backdoor)


Demo 6 –  Persistence Through Accessibility Programs (Trojan Occamy)


Demo 7 – Persistence Through AppInit DLLs (T9000 APT Backdoor)


Demo 8 – DLL Search Order Hijacking

Share:

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.