Introduction This is the fifth post of a series which regards the development of malicious software. In this series we will explore and try to implement multiple techniques used by malicious applications to execute code, hide from defenses and persist. In the previous posts we explored anti-VM, anti-sandbox, anti-debugging and anti-static-analysis methods. In this post we’ll explore some cool tricks to further obscure our code like parent PID spoofing, process protection, environmental keyi...