- Apr 17, 2021
- 454
What’s your comment on this ( Video - Antivirus vs RedLine Stealer malware Competition )?I do not like the possibility of excluding the paths by the attacker, even if it is not commonly used in the wild against home users.
This method can invalidate AV protection, but it is hard to test how effective it could be in widespread (automated) attacks. There are some additional factors that must be taken into account:
1. It is usually easier and more efficient to use a new 0-day (morphed) variant, than creating a loader and finding an older malware (X.exe in the video) that can bypass the AV behavior-based protection.
2. We must be certain that the X.exe (older malware) can bypass the AV behavior-based protection. This can be tested, but the AV can learn during the test. So, the test can increase malware detection (by behavior).
3. After some time, the AV can behaviorally detect the initial malware loader, even if the X.exe is executed from the excluded folder.
In targeted attacks, the above points can be less important. So it would be interesting to test how efficient this method could be.
This technique has been used in the wild.