(GREM) Giac Reverse Engineering Malware Practice Test

GREM - Giac Reverse Engineering Malware Malicious Executable Analysis Questions and Answers

Free · Instant Results

An analyst is performing static analysis on a suspicious Windows executable. They observe a high-entropy section within the PE file and a very small import address table (IAT) that only lists functions like `LoadLibraryA` and `GetProcAddress`. Which of the following techniques has the malware likely employed?
▶ Start Practice Test