By Alessandro Mascellino @a_mascellino - January 30, 2023 Check Point Research: Following the Scent of TrickGate: 6-Year-Old Packer Used to Deploy the Most Wanted Malware
The question is, how on earth do these malware samples manage to hide from EDR's? Because the whole point of them is to spot malware not by signatures but based on suspicious behavior in case AV's fail to detect them. So if they are not actually trying to disable EDR's and can still hide or bypass them, then these EDR's need to go back to the drawing board.