Summary
We began this chapter by covering some fascinating concepts to expand our knowledge of malware development. We did so by taking an in-depth look at sophisticated antivirus and EDR evasion techniques. We started by studying the mechanics of the antivirus kernel. By doing so, we got a comprehensive understanding of how antivirus engines work.
Then, we revealed various strategies for evading static detection. Here, we understood and applied various techniques to bypass static detection mechanisms. We learned how to create malware that can evade detection by antivirus systems by covering specific examples that implemented XOR encryption.
Next, we learned how to evade dynamic analysis and covered another skill that taught us about various strategies we can implement to do so. We concluded this chapter by learning about advanced evasion techniques and mastering advanced strategies and tactics so that we can bypass EDR systems, as well as antivirus systems, using syscalls.
...