Practice Test Geeks home

GREM - Giac Reverse Engineering Malware Malware Deobfuscation Techniques Questions and Answers

A malware analyst is performing static analysis on a Windows executable and observes that the Import Address Table (IAT) is unusually small, containing only a few essential functions like `LoadLibraryA` and `GetProcAddress`.
However, dynamic analysis reveals the malware makes numerous suspicious API calls related to network communication and file system manipulation.

Which of the following obfuscation techniques is MOST likely being used?

Select your answer