A malware analyst is performing static analysis on a suspicious executable.
The analyst notes that the file has a very small import address table (IAT) but a section with unusually high entropy.
What is the most likely reason for these characteristics?