Aside from utilizing junk code and conducting metamorphic transformations, BabbleLoader also exploits a plethora of other techniques, including unique control flow and encryption, to conceal malicious activities from traditional and artificial intelligence-based detection systems, according to an Intezer analysis.