This is a partial replication of results of the "AVLeak: Fingerprinting Antivirus Emulators Through Black-Box Testing" paper that was presented at WOOT '16 and Black Hat USA 2016. Techniques from the paper are used to leak "fingerprints" from the x86 Windows emulators of various AV software. This can be used to develop and detect evasive malware.
Special thanks to Alexei Bulazel (@0xAlexei) for his assistance.
8C777025 | 949A2A6D | A3150A5E | B50C3DF2 | |
---|---|---|---|---|
Environmental Artifacts | 3 | 3 | 4 | 3 |
OS API Inconsistency | 0 | 2 | 0 | 1 |
Network Emulation | 0 | 0 | 0 | 0 |
Timing | 0 | 0 | 0 | 0 |
Process Introspection | 0 | 0 | 0 | 0 |
CPU “Red Pills” | 0 | 0 | 0 | 0 |