Which term describes malware that uses obfuscated or layered code to mislead disassembly and analysis?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which term describes malware that uses obfuscated or layered code to mislead disassembly and analysis?

Explanation:
Hiding the true instructions by wrapping and obfuscating the code to defeat reverse engineering is what armor does. Armored viruses are designed with protective layers around their payload—obfuscated or layered code, encrypted sections, and other tricks—that make static disassembly and analysis very difficult. This broad protective approach goes beyond simply trying to fool a single disassembler; it aims to shield the whole malware from both static and dynamic scrutiny. While anti-disassembly focuses on specific tricks to confuse disassemblers and anti-emulation targets emulation-based analysis, armor encompasses the overall strategy of obfuscation and layering to deter analysis in general. Anti-heuristics, on the other hand, is about evading heuristic-based detection, not about hindering analysis of the code itself.

Hiding the true instructions by wrapping and obfuscating the code to defeat reverse engineering is what armor does. Armored viruses are designed with protective layers around their payload—obfuscated or layered code, encrypted sections, and other tricks—that make static disassembly and analysis very difficult. This broad protective approach goes beyond simply trying to fool a single disassembler; it aims to shield the whole malware from both static and dynamic scrutiny. While anti-disassembly focuses on specific tricks to confuse disassemblers and anti-emulation targets emulation-based analysis, armor encompasses the overall strategy of obfuscation and layering to deter analysis in general. Anti-heuristics, on the other hand, is about evading heuristic-based detection, not about hindering analysis of the code itself.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy