Practice Test Geeks home

GREM - Giac Reverse Engineering Malware Malicious Executable Analysis Questions and Answers

An analyst is performing static analysis on a suspicious Windows executable.
They observe a high-entropy section within the PE file and a very small import address table (IAT) that only lists functions like `LoadLibraryA` and `GetProcAddress`.

Which of the following techniques has the malware likely employed?

Select your answer