For example. We can test for six or so conditions to detect a sandbox for . Including but not limited to, vCPU threads, physical memory, uptime, whether or not it’s domain joined, unique files created on disk, etc. Since we can check for a sandbox after X amount of seconds plus random jitter, we can create a asynchronous process controlled by a or , that periodically returns control flow to the dispatcher. Then returns to main()

#sandboxevasion #junkcode #deadcode #mutex #thread #fiber #semaphore

Last updated 2 years ago

is the process of using the integers returned from arithmetic operators, with bitwise operators such as AND, OR, XOR, NEGATE, etc. It has many practical applications, including creating , , before deobfuscating it in a LoadLibraryW -> GetProcAddress() function, or running to fool sandboxes. The latter is particularly interesting because instead of merely exiting, we can keep testing for sandbox conditions

#mixedbooleanarithmetics #opaquepredicates #obfuscatingpointers #ordinalobfuscation #junkcode

Last updated 2 years ago