Skip to content

Latest commit

 

History

History
37 lines (31 loc) · 1.82 KB

File metadata and controls

37 lines (31 loc) · 1.82 KB
ID OB0001
Created 1 August 2019
Last Modified 12 June 2023

Anti-Behavioral Analysis

Behaviors that prevent, obstruct, or evade behavioral analysis of malware--for example, analysis done using a sandbox or debugger. Because the underlying methods differ, separate "detection" and "evasion" behaviors are defined for some anti-behavioral analysis areas.

  • Capture Evasion B0036
  • Conditional Execution B0025
  • Debugger Detection B0001
  • Debugger Evasion B0002
  • Dynamic Analysis Evasion B0003
  • Emulator Detection B0004
  • Emulator Evasion B0005
  • Executable Code Virtualization B0008
  • Hijack Execution Flow F0015
  • Memory Dump Evasion B0006
  • Sandbox Detection B0007
  • Software Packing F0001
  • Virtual Machine Detection B0009

References

[1] https://search.unprotect.it/map/

[2] InDepthUnpacking, course content for teaching malware anti-analysis techniques and mitigations, with emphasis on packers. https://github.com/knowmalware/InDepthUnpacking