GET /api/techniques/149/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 149,
    "key": "checking-malware-name",
    "unprotect_id": "U1303,U0401",
    "name": "Checking Malware Name",
    "description": "Malware can use various techniques to evade detection by security analysts and researchers. One such technique is to check the name of the malware sample before fully executing on the infected machine. If the sample has been renamed to a blacklisted name, such as \"malware.exe\" or \"sample.exe\", or even with the file hash, the malware can detect this and change its behavior or terminate its process to avoid being detected and analyzed. This technique allows the malware to remain undetected and continue its malicious activities on the infected machine.",
    "resources": "",
    "creation_date": "2020-09-22T06:49:06Z",
    "tags": "malware,\r\nsample,\r\nblacklisted names,\r\nprocess,\r\nfile hash,",
    "modification_date": "2023-10-04T10:40:12.913000Z",
    "category": [
        1,
        6
    ],
    "rules": [
        129
    ],
    "attachments": [],
    "featured_api": [],
    "contributors": []
}