Some malware authors add benign code/behavior to their malware just to throw off antiviruses and IDSs which employ machine learning to detect malware. There is a name for this technique (and even a Wikipedia page somewhere) but I can't seem to figure out what it is or find it on Google.
            Asked
            
        
        
            Active
            
        
            Viewed 208 times
        
    1
            
            
        - 
                    1Do you mean *"mimicry"*, i.e. looking like something good while being bad? – Steffen Ullrich Dec 03 '19 at 05:00
 - 
                    It is mimicking for sure, but that's not the term. Essentially the idea is to stuff a malware with a bunch of code from well-known benign programs. – kansas_bulldog382 Dec 03 '19 at 05:09
 - 
                    1I know what you mean, like in [this bypass of Cylance](https://skylightcyber.com/2019/07/18/cylance-i-kill-you/). But I'm not sure that there is a special term focusing on what you mean and I cannot find any such term in this post either. – Steffen Ullrich Dec 03 '19 at 06:02
 - 
                    I think you mean [polymorphic malware](https://digitalguardian.com/blog/what-polymorphic-malware-definition-and-best-practices-defending-against-polymorphic-malware). There are open source frameworks for this like [Veil](https://www.veil-framework.com/) – paj28 Dec 03 '19 at 11:03
 - 
                    @SteffenUllrich That is exactly what I was thinking of! I could have sworn I saw a Wiki page on that technique and it was given some interesting name I was hoping I could search up, but I suppose if articles like the one you linked don't use the term, then maybe it hasn't taken hold. – kansas_bulldog382 Dec 03 '19 at 17:42
 - 
                    @paj28 I know its not polymorphism per se. Polymorphic decryptors don't necessarily patch in code from other programs, which is the technique I am looking for. Thanks for bringing up Veil though, that'll be something interesting to look into – kansas_bulldog382 Dec 03 '19 at 17:50
 
2 Answers
1
            
            
        I think the technique is called obfuscation using "dead code insertion" where you add routines that don't perform any function to throw off AV static and dynamic analysis. I read it here Also this wiki leaks paper shows experiments with AV that use techniques of adding functions that dont do anything but bypass AV dynamic analysis
        yeah_well
        
- 3,699
 - 1
 - 13
 - 30
 
1
            
            
        Malware hiding within an app with a benign purpose is typically called a Trojan, after the famous story of the Trojan Horse.
        Gaius
        
- 810
 - 6
 - 7