September 2024
Intermediate to advanced
488 pages
13h 29m
English

In the previous three chapters, you’ve seen how malware can query and enumerate OS artifacts and configurations to understand its environment and detect that it’s being analyzed. This chapter will focus on how malware can actively identify analysis sandboxes and VM environments by inspecting the anomalies that malware analysis tools introduce, monitoring virtual processor performance and timing, and abusing virtual processor instructions.
When malware is executed in a sandbox or malware analysis environment, the sandbox or analysis tools can give ...