Malware Signatures

  1. Home
  2. Signatures
  3. Malware Signatures
  4. rex.array_join.006

rex.array_join.006

There are various techniques for obfuscating the malicious code. In this case, the functions and payload parts are split into several variables which are joined and their letters are reordered in order to prevent easy reading of the malware.

Anything can be encoded by this method, a backdoor, a spam injection tool, a credit card stealer or a crypto-miner.

Severity

MEDIUM