- Dec 12, 2013
- 542
And the next test of Polish AVLab
https://avlab.pl/sites/default/files/68files/Malware_Fileless_Protection_Test_EN.pdfThe threats examined in this report are so-called fileless malware. Although the infection vector usually starts traditionally, i.e. from the delivery of a malicious file to the victim’s computer – via scam or a drive-by download attack as a result of using an exploit – this is where the similarities to traditional attacks with files end. The fileless malicious software operates directly in the computer’s internal memory. In this scenario, the activated virus will not be transferred to quarantine by the protecting software as it is not a file, but a set of instructions to be executed, operating on system processes.
(...)
Four types of malicious software files with similar instructions were used to check the effectiveness of protecting modules of each tested program.
• M1.bat file included an instruction of virus download via
PowerShell with suitable parameters.
• M2.exe compiled file included similar instructions.
• M3.exe file was subjected to code obfuscation.
• M4.docm file included malicious macroinstructions activating
PowerShell with relevant parameters.