AV Evasion and others tools

AV Evasion

AV Evasion

- Static Signature Analysis

 

- Static Heuristic Analysis

 

- Dynamic Analysis

 

Static Signature Analysis

Static signature analysis is a blacklist based mechanism where the checksum of the binary or part of it are checked against a signature database.

 

It can detect known malware but it's not able to detect unknown binaries and often just small changes to the original sample are needed to bypass it.

Static HEURISTIC Analysis

Instead of relying on a known signature, the AV can perform static analysis on the binary to check what code pattern are present. It can generate false positives.

 

eg: CallNextHookEx is used by userland keyloggers

 

In order to escape this analysis all the malicious code must be hidden from the AV. This is usually done with encryption.

 

 

DYNAMIC Analysis

The analyzed binary is executed in a sandbox environment where heuristic and memory scanning techniques are used to detect obfuscated malware.

 

In order to escape this analysis the malware has to prevent the AV sandbox to execute its decryption stub to not reveal the malicious code that will trigger the heuristic.

DYNAMIC ANALYSIS EVASION

DYNAMIC ANALYSIS EVASION

DYNAMIC ANALYSIS EVASION

DYNAMIC ANALYSIS EVASION

DYNAMIC ANALYSIS EVASION

REFERENCES

PHANTOM EVASION

PHANTOM EVASION

- It can generate (almost) FUD exe/elf/dmg/apk payloads

 

- It uses a mix of XOR encryption, AV detection and junk code injection techniques to avoid being detected by AVs

 

- It supports msfvenom shellcodes

 

- DEMO!

OTHER TOOLS

LONELY POTATO

reGeorg

red team scripts by snado

AV Evasion

By Francesco Soncina

AV Evasion

  • 412