Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Anti-Sandbox Check - Known ProductIDs #190

Open
recvfrom opened this issue Sep 5, 2019 · 2 comments
Open

Anti-Sandbox Check - Known ProductIDs #190

recvfrom opened this issue Sep 5, 2019 · 2 comments
Assignees

Comments

@recvfrom
Copy link
Contributor

recvfrom commented Sep 5, 2019

Some malware will look for ProductIds associated with commercial sandboxes and stop running if detected. For example, from [1]:

76487-337-8429955-22614 // Anubis Sandbox
76487-644-3177037-23510 // CW Sandbox
55274-640-2673064-23950 // Joe Sandbox

Although these checks are still common in malware, they are a bit dated (Anubis has shutdown, for instance). Is it worth adding a check for these?

[1] https://cofense.com/kutaki-malware-bypasses-gateways-steal-users-credentials/

@Waterman178
Copy link

I think it's worth adding it

@recvfrom
Copy link
Contributor Author

From [1]:

76487-640-1457236-23837 // Anubis
76497-640-6308873-23835 // CWSandbox 2.1.22
76487-640-8834005-23195
76487-640-0716662-23535
76487-644-8648466-23106
00426-293-8170032-85146
76487-341-5883812-22420
76487-OEM-0027453-63796 // Comodo Camas

From [2]:

76487-640-1464517-23259 // malwr.com sandbox
76487-341-0620571-22546 // From one of the virustotal sandboxes

It'd also be cool to check for the repeating patterns used by JoeSecurity as found in [2]

All the annotations above are what I've been able to find from searching the web, but as you can see their are many that I couldn't find any information on. [1] mentions that some of these are associated with GFI and Kaspersky, but I'm not sure which. I wonder if these lists are on some hacker forum somewhere, for instance, and if so, it'd be awesome if we could collect that info here

[1] https://www.cybereason.com/blog/betabot-banking-trojan-neurevt
[2] https://thisissecurity.stormshield.com/2014/08/20/win32atrax-a/
[3] https://www.kernelmode.info/forum/viewtopic.php?f=16&t=2894

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants