Threat actors like to make detection and analysis of any malicious code they create as difficult as possible – for obvious reasons. There are any number of techniques which they may employ in this area, nevertheless, the one approach, that is common to pretty much all threat actors, is the use of obfuscation.
Script obfuscation using multiple instances of the same function, (Mon, Aug 5th)
This post was originally published on this site