Hunting for irregular processes
Critical process impersonation
Some malware will impersonate legitimate processes by running under a similar name
One way to detect this malware is to use string similarity algorithms
Damerau-Levenshtein distance algorithm:
Unusual executable locations
Some malware runs out of unusual locations (e.g., Recycle Bin) to avoid being easily detected
Last updated