TIP: Click on subject to list as thread! ANSI
echo: alt-comp-anti-virus
to: ALL
from: FROMTHERAFTERS
date: 2015-11-25 19:40:00
subject: Re: Does any common malwa

After serious thinking RayLopez99 wrote :
> The LA Times reports that the same family of virus/malware/badware that 
> infected Target a couple of years ago is making the rounds again this year, 
> targeting retailers.  The interesting thing to me was that the badware uses 
> encryption to change its signature.
>
> My question is whether any 'common' badware such as detectable by today's 
> commercial engines have this capability.  Names would be nice or just an 
> acknowledgement that such badware exists.  I'm curious as to how the 
> commercial anti-virus companies even detect this type of badware, maybe they 
> know of a initial signature that's always present before the badware morphs, 
> and they detect this signature?
>
> RL

This is the essence of what separates viruses from most other malware. 
Most of today's malware uses server side polymorphism to change its 
signature, but the polymorphic viruses accomplished this all by 
themselves.

Basically, they encrypt themselves as they reproduce and make a 
decryptor to decrypt it when the offspring itself executes. Then AV 
(not so much AM) detects the decryption algorithm which itself has 
polymorphism.

AV often has to emulate an execution environment to sandbox the 
decryptor to allow the beast to decrypt itself enough for not only 
detection, but for identification. This is one major reason why some of 
us like to emphasize that "virus" and "malware" are different despite 
what the average Joe thinks.

Actually, this technology is fairly old now, and it will be found in 
worms and viruses (self-replicating malware) which are less common than 
they used to be, and why one needs both AV *and* AM instead of just AM 
software.

You might like reading this:

https://www.symantec.com/avcenter/reference/hunting.for.metamorphic.pdf
--- NewsGate v1.0 gamma 2
* Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.