(GREM) Giac Reverse Engineering Malware Practice Test

GREM - Giac Reverse Engineering Malware Malware Deobfuscation Techniques Questions and Answers

Free · Instant Results

A malware analyst is performing static analysis on a Windows executable and observes that the Import Address Table (IAT) is unusually small, containing only a few essential functions like `LoadLibraryA` and `GetProcAddress`. However, dynamic analysis reveals the malware makes numerous suspicious API calls related to network communication and file system manipulation. Which of the following obfuscation techniques is MOST likely being used?
▶ Start Practice Test