back to agenda
on this page
Malware AV Evasion. Malware and Cryptography
- 18:20
- Wed
- 15 Nov
Stage:
Briefing Stage 3
Format:
Session
Presenter:
Research in the field of bypassing AV solutions and the role of cryptography in malware development. Application of classical cryptographic algorithms for payload and C2 communicate encryption.
Practical research has been carried out: the results of using Skipjack, TEA, Madryga, RC5, A5/1, Z85, DES, mmb, Kuznechik, etc. encryption algorithms have been analysed.
The application of cryptography based on elliptic curves is also being researched. How does all this affect the VirusTotal detection score and how applicable is it for bypassing AV solutions (AV bypass).
In some researched practical cases, we get FUD malware. Bypass AV Kaspersky, Windows Defender. ESET NOD32 in some practical cases.
Presenter: