Generating Antivirus Evasive Executables Using Code Mutation
Stefan Sabin Nicula ()
Informatica Economica, 2018, vol. 22, issue 2, 81-86
Abstract:
The paper is focus around developing a utility tool based on a python component and a C++ stub in order to compile executable Windows files that are capable of staying undetected to Antivirus solutions. The research process was focused around Antivirus software's ability to detect a malicious file and methods of bypassing the identified techniques. Dependencies and auxiliary links of the project are defined as inputs from the user as well as support software and frameworks designed to provide malicious payload with listeners and handlers for the generated shellcode. Overall, the utility tool is able to receive shellcode and one encryption key as input and generate malware in the shape of a Windows executable file that is able to successfully run and bypass Antivirus detection.
Keywords: Antivirus bypass; Antivirus evasion; Executable malware; Shellcode execution; Undetected virus; Obfuscation techniques (search for similar items in EconPapers)
Date: 2018
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://revistaie.ase.ro/content/86/08%20-%20nicula.pdf (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aes:infoec:v:22:y:2018:i:2:p:81-86
Access Statistics for this article
Informatica Economica is currently edited by Ion Ivan
More articles in Informatica Economica from Academy of Economic Studies - Bucharest, Romania Contact information at EDIRC.
Bibliographic data for series maintained by Paul Pocatilu ().