A malware analyst is performing static analysis on a suspicious executable. The analyst notes that the file has a very small import address table (IAT) but a section with unusually high entropy. What is the most likely reason for these characteristics?
-
A
The file is a benign utility with minimal dependencies.
-
B
The executable is corrupted and missing its header information.
-
C
The malware is packed or encrypted to obfuscate its true code.
-
D
The file is a script-based malware, such as a PowerShell script.