Could anyone tell me generally how AV works at the level of scanning the Import Table? For example, I would assume an exe with import table of
VirtuallAlloc,
WriteProcessMemory,
getprocaddress,
loadlibrary,
w32_Connect
would be flagged by AV. However Im not sure, because I have a pretty generic malware that has this but not flagged by some major vendors. Can any one share insight into typical rules that AV does not like in exe/dlls? (Forexample: Which imports raise suspicion?)
VirtuallAlloc,
WriteProcessMemory,
getprocaddress,
loadlibrary,
w32_Connect
would be flagged by AV. However Im not sure, because I have a pretty generic malware that has this but not flagged by some major vendors. Can any one share insight into typical rules that AV does not like in exe/dlls? (Forexample: Which imports raise suspicion?)