Polymorphism
Description: The malware changes its code or appearance with each infection or execution, making it difficult to detect with signature-based methods.
Example: Changing variable names, code structure, or using different encryption keys in each instance.
Last updated