App Review Packers, polymorphism and common misconceptions

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Content created by
struppigel

struppigel

Super Moderator
Thread author
Verified
Staff Member
Well-known
Apr 9, 2020
667
How do packers work? What is binary padding and why is not the same as polymorphism.
What is polymorphism in packers? Why is a scantime crypter not a packer? I answer all those questions in this video.

00:00 Intro
01:01 Why learn about packers?
01:36 Packer types
02:30 How packing works
03:50 Misconception: Packers inject stub into target
05:03 How packed files execute target file
06:11 Legit and malicious packers?
07:00 Misconception: Scantime crypter are packers
08:02 Target file placement in the stub
09:12 Binary Padding and why it is no polymorphism
10:03 Polymorphic packers
10:49 Oligomorphic packers
11:47 How polymorphism helps malware evade AVs
13:36 Metamorphism does not apply to packers

 

cruelsister

Level 43
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,224
Thank you for an excellently clear (and produced) video. The point that you discussed at the end of the video regarding routine detection of packers by AV vendors is an important one for any that code malware. Sadly some AV vendors will by default flag a file malicious that would otherwise be considered legitimate simply because something like UPX was utilized. Microsoft is notorious for this with their "Trojan:Win32/Wacatac.B!ml" designation. This can, from time to time, be an inconvenience (not that I would know anything about it).
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top