A forum for reverse engineering, OS internals and malware analysis 

Search found 124 matches: AntiVM

Searched query: antivm

 Go to advanced search

Re: VirtualBox Anti-AntiVM

 by EP_X0FF ¦  Thu Jan 03, 2013 5:22 pm ¦  Forum: Tools/Software ¦  Topic: VirtualBox Anti-AntiVM ¦  Replies: 63 ¦  Views: 214173

Cassiel wrote:Are there also patched versions for Debian/Linux?
No, you have to do this yourself. Have no idea how this will be looking for Linux.

Re: VirtualBox Anti-AntiVM

 by Cassiel ¦  Thu Jan 03, 2013 2:24 pm ¦  Forum: Tools/Software ¦  Topic: VirtualBox Anti-AntiVM ¦  Replies: 63 ¦  Views: 214173

I followed all the steps you asked with one exception. Considering I am using a debian as host I cannot replace the dll files. Are there also patched versions for Debian/Linux?

Re: Citadel

 by EP_X0FF ¦  Wed Jan 02, 2013 6:35 pm ¦  Forum: Malware ¦  Topic: Citadel (Zeus clone) ¦  Replies: 197 ¦  Views: 407107

... knows how to bypass this then this is also welcome. Regards Cassiel Hello, attach or point to the sample you are talking about. AFAIR Citadel AntiVM (1.3.4.5) was just a lame check of CompanyName part VERSION_INFO block of running processes. However it might have additional vm detection at ...

Re: Dumping malware process

 by EP_X0FF ¦  Fri Dec 28, 2012 11:10 am ¦  Forum: Malware ¦  Topic: Win32/Caphaw (Shylock) ¦  Replies: 46 ¦  Views: 54935

Third - actual malware running from MPRESS allocated region (again different from the original imagebase). Here all AntiVM tricks being executed. Itself this is Backdoor:Win32/Caphaw.D In attach MPRESS binary extracted from 1st layer. Decompress it and you will have real malware. ...

Re: Dumping malware process

 by EP_X0FF ¦  Sun Dec 23, 2012 2:18 pm ¦  Forum: Malware ¦  Topic: Win32/Caphaw (Shylock) ¦  Replies: 46 ¦  Views: 54935

... control goes to third layer. Third - actual malware running from MPRESS allocated region (again different from the original imagebase). Here all AntiVM tricks being executed. Itself this is Backdoor:Win32/Caphaw.D In attach MPRESS binary extracted from 1st layer. Decompress it and you will have ...

Re: Anti-vm malware samples that don't use Anti-Debugging

 by EP_X0FF ¦  Wed Dec 12, 2012 10:09 am ¦  Forum: Reverse Engineering and Debugging ¦  Topic: Anti-vm malware samples that don't use Anti-Debugging ¦  Replies: 2 ¦  Views: 6076

You have already asked the same question before. Even simple search gives multiple results. Go & try them.
http://www.kernelmode.info/forum/search ... rds=AntiVM

Re: Rootkit MaxSS (alias TDSS, SST, Alureon.FE, Olmasco)

 by Ormu ¦  Tue Dec 04, 2012 4:57 pm ¦  Forum: Tools/Software ¦  Topic: VirtualBox Anti-AntiVM ¦  Replies: 63 ¦  Views: 214173

... are installed. This is important part of any malware research - never use any kind of VM tools. Next configure DMI information to fool rootkit antivm checking. For vbox: VBoxManage setextradata "My VM" "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSVendor" "Gigabyte" (any vendor but not Microsoft/Virtual ...

Re: VirtualBox Anti-AntiVM

 by kareldjag/michk ¦  Mon Dec 03, 2012 9:06 pm ¦  Forum: Tools/Software ¦  Topic: VirtualBox Anti-AntiVM ¦  Replies: 63 ¦  Views: 214173

Also interesting Pafish demo which checks for several VM
https://github.com/a0rtega/pafish

rgds

Re: Malware/Not classified

 by EP_X0FF ¦  Sat Nov 24, 2012 2:47 am ¦  Forum: Malware ¦  Topic: WinNT/Simda ¦  Replies: 43 ¦  Views: 59529

Simda? Yes, with multiple AntiVM, AntiSandboxie, anti-forensics on board. Blacklisted Windows Product ID's 76487-337-8429955-22614 (Anubis) 76487-640-1457236-23837 (Anubis) 55274-640-2673064-23950 (JoeBox) 76487-644-3177037-23510 (CWSandbox) ...

Re: VirtualBox Anti-AntiVM

 by nex ¦  Mon Oct 22, 2012 7:41 am ¦  Forum: Tools/Software ¦  Topic: VirtualBox Anti-AntiVM ¦  Replies: 63 ¦  Views: 214173

You might want to give a look at: http://pastebin.com/RU6A2UuB https://github.com/cuckoobox/community/blob/master/modules/signatures/antivm_disk_identifier.py https://github.com/cuckoobox/community/blob/master/modules/signatures/vboxdetect_acpi.py The last two are signatures to detect those tricks, ...

  • 1
  • 7
  • 8
  • 9
  • 10
  • 11
  • 13