1. IT-Security >
  2. Hacking >
  3. Malware campaign attempts to evade analysis with Any.Run sandbox

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Malware campaign attempts to evade analysis with Any.Run sandbox


Hacking vom | Direktlink: securityaffairs.co Nachrichten Bewertung

Malware authors are implementing the capability to check if their malicious code is running in the Any.Run malware analysis service. Vxers are implementing the capability to check if their malware is running in the Any.Run interactive online malware sandbox to prevent them from being analyzed by experts. Every time malware is uploaded to the platform, […]

The post Malware campaign attempts to evade analysis with Any.Run sandbox appeared first on Security Affairs.

...
https://securityaffairs.co/wordpress/105830/malware/any-run-sandbox-evasion.html?utm_source=rss&utm_medium=rss&utm_campaign=any-run-sandbox-evasion

Externe Quelle mit kompletten Inhalt anzeigen


Zur Startseite von Team IT Security

➤ Weitere Beiträge von Team Security | IT Sicherheit

Malcolm - A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs

vom 324.01 Punkte ic_school_black_18dp
Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind: Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be

Scrounger - Mobile Application Testing Toolkit

vom 288.86 Punkte ic_school_black_18dp
Scrounger - a person who borrows from or lives off others. There is no better description for this tool for two main reasons, the first is because this tool takes inspiration from many other tools that have already been published, the second reason is because it lives off mobile application's vulnerabilities. Why Even t

MMD-0030-2015 - New ELF malware on Shellshock: the ChinaZ

vom 273.12 Punkte ic_school_black_18dp
The backgroundThe bash Shellshock vulnerability (link) is still proven to be one of the fastest way to spread ELF malware infection to NIX boxes in internet, along with Linux systems which are still having the vulnerable version. This fact that is not kno

MMD-0030-2015 - New ELF malware on Shellshock: the ChinaZ

vom 273.12 Punkte ic_school_black_18dp
The backgroundThe bash Shellshock vulnerability (link) is still proven to be one of the fastest way to spread ELF malware infection to NIX boxes in internet, along with Linux systems which are still having the vulnerable version. This fact that is not kno

TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors

vom 252.98 Punkte ic_school_black_18dp
Original release date: April 27, 2017 | Last revised: May 14, 2017Systems Affected Networked Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurri

Tango down report of OP China ELF DDoS'er

vom 221.5 Punkte ic_school_black_18dp
This report is credited to the team work between MMD, CERT and fellow researchers involved. Tango OP Announcement: We are releasing the take-down (Tango OP) project information of our current on-going operation against the ELF DDoS malware, the threat

Tango down report of OP China ELF DDoS'er

vom 221.5 Punkte ic_school_black_18dp
This report is credited to the team work between MMD, CERT and fellow researchers involved. Tango OP Announcement: We are releasing the take-down (Tango OP) project information of our current on-going operation against the ELF DDoS malware, the threat

P4wnP1 A.L.O.A. - Framework Which Turns A Rapsberry Pi Zero W Into A Flexible, Low-Cost Platform For Pentesting, Red Teaming And Physical Engagements

vom 216.52 Punkte ic_school_black_18dp
P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming and physical engagements ... or into "A Little Offensive Appliance".0. How to installThe latest image could be fo

Revamping in-house dynamic analysis with VirusTotal Jujubox Sandbox

vom 205.82 Punkte ic_school_black_18dp
VirusTotal Jujubox Sandbox in action: This is a small datastudio set up to illustrate the kind of analytics that can be built with a massive dynamic analysis setup, generating IoCs. Note that there are several pages. One of the main themes of VirusTota

AA20-133A: Top 10 Routinely Exploited Vulnerabilities

vom 199.83 Punkte ic_school_black_18dp
Original release date: May 12, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader U.S. Government are providing this technical guidance to advise IT security professionals a

AA20-133A: Top 10 Routinely Exploited Vulnerabilities

vom 199.83 Punkte ic_school_black_18dp
Original release date: May 12, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader U.S. Government are providing this technical guidance to advise IT security professionals a

MMD-0047-2015 - SSHV: SSH bruter ELF botnet malware w/hidden process kernel module

vom 198.76 Punkte ic_school_black_18dp
Background Apparently Linux ELF malware is becoming an interesting attraction from several actors from People Republic of China(in short: PRC). This post is one good example about it. It explains also why myself, from my team (MMD), put many effort t

Team Security Diskussion über Malware campaign attempts to evade analysis with Any.Run sandbox