Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Protecting VMWare from CPUID hypervisor detection

$
0
0
One of the less-known anti-sandbox detection tricks relies on the instruction CPUID that is executed with EAX=1 as an input parameter. When executed the values returned by general purpose registers describe the various Processor Info and Feature Bits. Some malware samples analyse the bit 31th of the value returned in the register ECX; the bit is equal to zero on the real CPU/hypervisor and 1 on the guest VM.

You can test this trick by running the following program.

more here...........http://www.hexacorn.com/blog/2014/08/25/protecting-vmware-from-cpuid-hypervisor-detection/

Viewing all articles
Browse latest Browse all 8064

Trending Articles