The article discusses the techniques of Dll Sideloading and Direct Syscalls as methods to evade antivirus and EDR solutions. It explains how Dll Sideloading exploits vulnerabilities in legitimate applications to load malicious DLLs while suggesting strategies to select the right executables that minimize detection risks. A notable example provided is Oleview.exe, which is signed by Microsoft and not commonly installed on Windows systems.
The article discusses outdated and misapplied techniques in malware development (MalDev), emphasizing the need to adapt to modern security measures like automated detection systems. It provides insights on various aspects of malware creation, including data storage in executables, encryption methods, process injection, and the limitations of conventional evasion techniques against security products. The author advocates for a deeper understanding of security software to identify effective blind spots for malware deployment.