EvilZone

Hacking and Security => Hacking and Security => : Tsar December 01, 2011, 06:16:33 AM

: Virtual Machines and Malware
: Tsar December 01, 2011, 06:16:33 AM
I was wondering if anyone here is knowledgeable about Virtual Machines - in particular the "Anti-VM" code/techniques that a lot of malicious software uses.
What I hope to find is a good configuration/tips for testing malware in VM environments by understanding the inner workings and exploits Anti-VM code my make use of, many people think virtual environments allow you to run malware isolated and therefore leaving the main machine unaffected, but this is not the case.

I was able to find this link:
http://superuser.com/questions/289054/is-my-host-machine-completely-isolated-from-a-virus-infected-virtual-machine

Some tips listed are:
Disable x86 virtualization
Disable networking on VM
Disable shared folders/file sharing between Host and VM

I would like to hear more from someone thing more experience in this however, so does anyone have experience with Anti-VM code/techniques and know details of how they work?
: Re: Virtual Machines and Malware
: FuyuKitsune December 01, 2011, 08:28:31 PM
Nearly all anti-VM just detects it. It usually checks the hardware configuration for generic or VM hardware. There are ways to check for abnormalities in memory, like the method used to detect the the old hypervisor debugger SoftICE.

VM escaping is fairly rare because it usually requires an exploit. A much easier exit would be going through files shares and computers on the VM's LAN, like the tips you listed, but those should not on by default.

I think the guy on superusers knows more about it than I do.
: Re: Virtual Machines and Malware
: Tsar December 02, 2011, 01:02:33 AM
Nearly all anti-VM just detects it.

So most just detect it and decide what to do if it is running in a VM? (Like choosing to stop running for example?)
: Re: Virtual Machines and Malware
: FuyuKitsune December 02, 2011, 02:39:00 AM
So most just detect it and decide what to do if it is running in a VM? (Like choosing to stop running for example?)
Yup. If it's a trojan, the good antis will run the program they're bound to. A lot of crappy antis just exit and do nothing. It's really freaking obvious that something's infected if it runs for two seconds and then instantly stops after being put in a VM or Sandbox.
: Re: Virtual Machines and Malware
: Jath December 04, 2011, 03:03:30 AM
He's a some info about breaking out of KVM


http://www.youtube.com/watch?v=hCPFlwSCmvU (http://www.youtube.com/watch?v=hCPFlwSCmvU)


i watched it a few weeks back. I don't remember if the talk was given at both blackhat and defcon or just defcon.


edit: yup, the talk was given at both blackhat and defcon. I watched the blackhat talk but they should be the same.