March 8, 2024, 2:04 p.m. | /u/_bruceketta

cybersecurity www.reddit.com

Hi all!
I have a question for the Reverse Engineering guys. Assume you have a malware packed with a common software (e.g. upx).

Ok you can unpack it and understand what it does, but if you want to write a detection rule that is able to find the packed version, is it actually feasible? Or is detecting the sample dynamically during runtime the only option that actually works?

can cybersecurity detect detection engineering find malware question reverse reverse engineering software understand unpack upx version

Senior Security Specialist, Forsah Technical and Vocational Education and Training (Forsah TVET) (NEW)

@ IREX | Ramallah, West Bank, Palestinian National Authority

Consultant(e) Junior Cybersécurité

@ Sia Partners | Paris, France

Senior Network Security Engineer

@ NielsenIQ | Mexico City, Mexico

Senior Consultant, Payment Intelligence

@ Visa | Washington, DC, United States

Corporate Counsel, Compliance

@ Okta | San Francisco, CA; Bellevue, WA; Chicago, IL; New York City; Washington, DC; Austin, TX

Security Operations Engineer

@ Samsara | Remote - US