{
	"id": "5b92a304-aaeb-4878-854a-596d701ab3d3",
	"created_at": "2026-04-06T00:16:52.46604Z",
	"updated_at": "2026-04-10T03:20:28.722751Z",
	"deleted_at": null,
	"sha1_hash": "0689de64d2e3b9fa83f2c2018d0d638c680309e4",
	"title": "X-Ray of Malware Evasion Techniques: Analysis, Dissection, Cure?",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28595,
	"plain_text": "X-Ray of Malware Evasion Techniques: Analysis, Dissection, Cure?\r\nArchived: 2026-04-05 17:58:17 UTC\r\nThis presentation has been presented at Bsides Sydney (https://bsidessydney.org/)\r\nMalware evasion consists of techniques used by malware to bypass security in place, circumvent automated and\r\nstatic analysis as well as avoiding detection and harden reverse engineering. There is a broad specter of techniques\r\nthat can be used. In this talk we will review the history of malware evasion techniques, understand the latest trends\r\ncurrently used by threat actors and bolster your security analysis skills by getting more knowledge about evasion\r\nmechanisms.\r\nSource: https://speakerdeck.com/fr0gger/x-ray-of-malware-evasion-techniques-analysis-dissection-cure\r\nhttps://speakerdeck.com/fr0gger/x-ray-of-malware-evasion-techniques-analysis-dissection-cure\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://speakerdeck.com/fr0gger/x-ray-of-malware-evasion-techniques-analysis-dissection-cure"
	],
	"report_names": [
		"x-ray-of-malware-evasion-techniques-analysis-dissection-cure"
	],
	"threat_actors": [],
	"ts_created_at": 1775434612,
	"ts_updated_at": 1775791228,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/0689de64d2e3b9fa83f2c2018d0d638c680309e4.pdf",
		"text": "https://archive.orkl.eu/0689de64d2e3b9fa83f2c2018d0d638c680309e4.txt",
		"img": "https://archive.orkl.eu/0689de64d2e3b9fa83f2c2018d0d638c680309e4.jpg"
	}
}