-
-
Notifications
You must be signed in to change notification settings - Fork 4
Open
Description
Sent the binary (sha256; 7101910d67a1b477edfb0a90c2424ef15b6cdbc2ef2dbb606b8854791eb98a25) for analysis and found both ATT&CK and Malware Behavior Catalog (MBC) that explicitly lists the following:
- ATT&CK Technique T1497.001: Virtualization/Sandbox Evasion::System Checks
- MBC Behavior B0009: Virtual Machine Detection
reference anti-VM strings targeting Xen
- "XenixServer" @ file+0x19E694
Could just be a fluke, but still hoping for a good explanation on why this behaviour exists, thanks.
Metadata
Metadata
Assignees
Labels
No labels