(Please note: This page is for demonstration purposes only)
Welcome to the online companion site for “Introduction to Multi-Stage Malware”. Check back often as new content is being added regularly. If you would like to leave course feedback, in the form of a testimonial, please click here.
Lesson Recording* (*Available after the August 5th delivery of this lesson)
Multi-Stage Malware obfuscates codes by implementing layers of encrypted code. The inner most layer downloads an encrypted package containing the final payload.
An example of Multi-Level Malware architecture – In this case, a user has downloaded a suspicious smartphone application from the Google Play Store. The application contains Multi-Stage Malware, which executes payloads across 4 stages, resulting in a Trojan that attempts to steal the user’s banking credentials.