Fileless Malware Protection Test (AVLab, X 2017)

ichito

Level 11
Thread author
Verified
Top Poster
Content Creator
Well-known
Dec 12, 2013
541
And the next test of Polish AVLab
The threats examined in this report are so-called fileless malware. Although the infection vector usually starts traditionally, i.e. from the delivery of a malicious file to the victim’s computer – via scam or a drive-by download attack as a result of using an exploit – this is where the similarities to traditional attacks with files end. The fileless malicious software operates directly in the computer’s internal memory. In this scenario, the activated virus will not be transferred to quarantine by the protecting software as it is not a file, but a set of instructions to be executed, operating on system processes.
(...)
Four types of malicious software files with similar instructions were used to check the effectiveness of protecting modules of each tested program.
• M1.bat file included an instruction of virus download via
PowerShell with suitable parameters.
• M2.exe compiled file included similar instructions.
• M3.exe file was subjected to code obfuscation.
• M4.docm file included malicious macroinstructions activating
PowerShell with relevant parameters.
https://avlab.pl/sites/default/files/68files/Malware_Fileless_Protection_Test_EN.pdf
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top