September 2024
Intermediate to advanced
488 pages
13h 29m
English

Hardware information, such as CPU speed and RAM allotment, and networking configurations, such as the MAC and IP addresses of the host’s network interfaces, can indicate to malware that it’s operating in a lab environment. Additionally, malware can use these pieces of information to establish context within its operating environment. In this chapter, we’ll discuss the techniques that malware might use to gather this information and evade detection.
System hardware configurations can provide valuable information to a malware sample that it can use to determine ...