In the escalating cat-and-mouse game between attackers and security vendors one of the fundamental levers on the attackers' side is the use of obfuscation — scrambling or otherwise disguising malicious code to make analyzing or detecting its purpose and intent more difficult. The use of obfuscation can be traced back to the earliest malware campaigns, and as security products have evolved to breakdown obfuscation techniques, new techniques are always quick to take their place.

Article Link: https://blog.barkly.com/dosfuscation-in-the-wild-emotet