13th Quarterly Meetup – Understanding Malware Persistence Techniques

In this meet, Monnappa K A delivered presentation on “Understanding Malware Persistence Techniques”

Demo 1 – Understanding the IFEO Technique

Demo 2 – Malware Using IFEO (Trojan.Zusy)

Demo 3 – Simple Anti-Analysis Using IFEO (Trojan.Small)

Demo 4 – Simple Anti-Analysis using IFEO (Brontok Worm)

Demo 5 – Winlogon Persistence (Turla gazer backdoor)

Demo 6 –  Persistence Through Accessibility Programs (Trojan Occamy)

Demo 7 – Persistence Through AppInit DLLs (T9000 APT Backdoor)

Demo 8 – DLL Search Order Hijacking


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.