Although Beep’s functionality is currently limited, it’s clear that the developers have high ambitions for a variety of functionality. While the evasion tactics used in Beep are plentiful, they generally center around avoiding anti-virus, and being difficult to reverse engineer. Behavioral analysis can still provide great value in detecting threats such as this. It’s important to have a defense-in-depth program which includes proactive threat hunting of post compromise activities in order to combat emerging threats such as Bleep. Binary Defense’s MDR and Managed Threat Hunting services are excellent solutions to assist with such needs.
Beepin’ Out of the Sandbox: Analyzing a New, Extremely Evasive Malware

