79498639

Date: 2025-03-10 16:58:12
Score: 1
Natty:
Report link

I will give it a try:

A « polymorphic » malware is expected to self-adapt to the environment provided. Thus according to the definition given above, your shall use metamorphic encryptor to alter file signature and propagate into the system.

Since you’re checksuming anyhow on-install and on-updates payload has to be rigorously identical to source-files thus trusted software is expected to be unexposed by default

For the rest of your filesystem altering the MD5 signature is deemed untraceable and a basic 128 bytes code chunk in a random text file or whatever shall introduce network vulnerabilities through à backdoor

If you intend to be ruining the target file system you should not trace network activity but rather alter critical executable such as /bin/chmod to do funny stuff

If you intend to mess with the hardware then alter the kernel through modprobe

each layer of complexity requiring more sophisticated offsec that a standard malware won’t fit

Polymorphic malware remaining malwares you should easily be able to detect and get rid of in non critical use cases

Sincerely

Reasons:
  • Long answer (-1):
  • No code block (0.5):
  • Unregistered user (0.5):
  • Low reputation (1):
Posted by: noobmorocco