Skip to content

Virtualization/Sandbox Evasion Behaviour #7

@man-im-unoriginal-af

Description

@man-im-unoriginal-af

Sent the binary (sha256; 7101910d67a1b477edfb0a90c2424ef15b6cdbc2ef2dbb606b8854791eb98a25) for analysis and found both ATT&CK and Malware Behavior Catalog (MBC) that explicitly lists the following:

  • ATT&CK Technique T1497.001: Virtualization/Sandbox Evasion::System Checks
  • MBC Behavior B0009: Virtual Machine Detection

reference anti-VM strings targeting Xen
- "XenixServer" @ file+0x19E694

Could just be a fluke, but still hoping for a good explanation on why this behaviour exists, thanks.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions