Hello, I'm a beginner about AV evasion. I developed my crypter and my malware both in C. The malware uses some winapi and the crypter uses ntdll calls to avoid AV detections.
1) Can the malware be blocked by the AV after its decryption and execution (done by the crypter) because of the winapi call used by the malware? If not, exactly why?
2) Should a malware decrypted and executed in memory be blocked only by the behavioral analysis? Can AV know what api are called after the memory execution?
1) Can the malware be blocked by the AV after its decryption and execution (done by the crypter) because of the winapi call used by the malware? If not, exactly why?
2) Should a malware decrypted and executed in memory be blocked only by the behavioral analysis? Can AV know what api are called after the memory execution?