Multiple Layers of Anti-Sandboxing Techniques, (Tue, Oct 31st)

This post was originally published on this site

It has been a while that I did not find an interesting malicious Python script. All the scripts that I recently spotted were always the same: a classic intostealer using Discord as C2 channel. Today I found one that contains a lot of anti-sanboxing techniques. Let's review them. For malware, it's key to detect the environment where they are executed. When detonated inside a sandbox (automatically or, manually, by an Analyst), they will be able to change their behaviour (most likely, do nothing)

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.