Navigating Anti-Virtual Machine Strategies
Anti-virtual machine techniques are predominantly found in widely spread malware, such as bots, scareware, and spyware, mainly because honeypots often use virtual machines and these types of malware generally target the average user’s computer, which is unlikely to be running a virtual machine. In this chapter, you will learn how to employ anti-virtual machine (anti-VM) strategies to counteract attempts at analysis.
In this chapter, we’re going to cover the following main topics:
- Filesystem detection techniques
- Approaches to hardware detection
- Time-based sandbox evasion techniques
- Identifying VMs through the registry