YoVDO

Slime - Automated Anti-Sandboxing Disarmament System

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Malware Analysis Courses Virtual Machines Courses

Course Description

Overview

Explore an automated disarmament system for malware equipped with anti-sandboxing techniques in this Black Hat conference talk. Delve into the challenges posed by sophisticated malware like Citadel and Zeus/GameOver that employ host-fingerprinting and other evasion tactics. Learn about the SLIME system's approach to disarming malware, focusing on exit reasons and pre-activity termination. Discover key technologies such as malware palpation, Code Execution Integrity, and retroactive condition analysis. Examine the implementation of execution logging frameworks and techniques for camouflaging VM/sandbox artifacts. Witness a disarming demo targeting anti-VMWare and sandbox evasion techniques. Gain insights into the prevalence of anti-VM malware and discuss the effectiveness of virtual machines in malware protection. This comprehensive presentation provides valuable statistics on evasive malware in the real world and reports on large-scale sample analysis results.

Syllabus

Intro
Contents
Background
Use the sandbox, Luke
Malware strike back
Related work
Motivation
Challenges
black hat
Chthonic anti-sandboxing
Type of anti-sandboxing
Environment awareness
Artifact fingerprinting
Execution environment fingerprinting
Execution timing detection
SLIME key technologies
Concept: malware palpatio
Malware palpation
Code Execution Integrity CEI
Execution branch detection
Retroactive condition analysis
Implementation
Execution logging framework
Camouflaging VM/sandbox related artifact existence
Disarming demo
Anti-VMWare
Sandbox evasion
Dataset
Are Anti-VM Too Few?
Offtopic: Artifact finding by Yara
Can Virtual Machine Protects You from Malware?
Conclusion


Taught by

Black Hat

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy