A multinational corporation's computer system was infiltrated by an advanced persistent threat (APT). During forensic analysis, it was discovered that the malware was utilizing a blend of two highly sophisticated techniques to stay undetected and continue its operations.
Firstly, the malware was embedding its harmful code into the actual binary or executable part of genuine system files rather than appending or prepending itself to the files. This made it exceptionally difficult to detect and eradicate, as doing so risked damaging the system files themselves.
Secondly, the malware exhibited characteristics of a type of malware that changes its code as it propagates, making signature-based detection approaches nearly impossible.
On top of these, the malware maintained a persistent presence by installing itself in the registry, making it able to survive system reboots.
Given these distinctive characteristics, which two types of malware techniques does this malware most closely embody?
49f4430
6 months agoLordXander
7 months, 3 weeks agoLordXander
7 months, 2 weeks agoanarchyeagle
8 months, 4 weeks agoqwerty100
9 months, 1 week agoqtygbapjpesdayazko
8 months, 1 week agoxbsumz
9 months, 2 weeks agoinsaniunt
9 months, 2 weeks ago