Decoding Malicious Camouflage: Analysing Evasion Techniques
An investigation into how contemporary malware families circumvent host-based defence architectures specifically AMSI and EDR and how those behaviours map back to detection and response.
- Evaluated evasion mechanisms employed by malware families to circumvent host-based defence architectures, specifically AMSI and EDR.
- Conducted isolated sandbox analysis using Any.Run and REMnux on Redline Stealer, WannaCry ransomware, and SheetRAT trojan.
- Mapped all findings to the MITRE ATT&CK framework to ensure industry-standard classification.