- Oct 9, 2016
- 6,144
I found an interesting case on the net. It was in the year 2009. I have to assume the case is true.
Read here
Apparently, the user ran SandboxieIE inside VMWare but the malware does nothing. Ran outside SB/VM and the trojan came alive. Likely to be a VM/SB-evading malware. NOD32 also detects nothing when the malware was ran outside the VM/SB environment.
To conclude
In that year in 2009 SB/VM likely not very robust/secure and the trojan signature wasn't updated in NOD32.
What’s the damage done?
Apparently, some privacy info being stolen and files being uploaded to ftp server
Quote from the link
Tuulilapsi
Member
2009-Jul-9 9:56 am
Sounds like the kind of simple and to the point malware that will fool quite a lot of people. Perhaps this is a nice case example of how software firewall outbound monitoring can sometimes be of quite a lot of use. I would expect that even many of the gullible folks would get suspicious if their firewall tells them that the archive file they just executed wants to connect to an FTP!
Unquote
A malware defeating a sandbox, a VM and an AV.
Do you think outbound monitoring by a firewall will help in this case? Can firewall prevent privacy info being exfiltrated?
How to prevent a malware from defeating 3 security apps (a sandbox, a VM and an AV/AM) in today's context say just ignore the outbound monitoring by a firewall? Add another security app? Like what in this case?
Read here
Trojan checks for SandBoxIE presence? - Security | DSLReports Forums
Forum discussion: Damn, I knew there are trojans/rootkits checking if they're being started up inside a VM. Now it seems they can check if they're being run inside a sandbox too? I downloaded an executable from Usenet called "e;inositol and anxiety disorder[Compress
www.dslreports.com
Apparently, the user ran SandboxieIE inside VMWare but the malware does nothing. Ran outside SB/VM and the trojan came alive. Likely to be a VM/SB-evading malware. NOD32 also detects nothing when the malware was ran outside the VM/SB environment.
To conclude
In that year in 2009 SB/VM likely not very robust/secure and the trojan signature wasn't updated in NOD32.
What’s the damage done?
Apparently, some privacy info being stolen and files being uploaded to ftp server
Quote from the link
Tuulilapsi
Member
2009-Jul-9 9:56 am
Sounds like the kind of simple and to the point malware that will fool quite a lot of people. Perhaps this is a nice case example of how software firewall outbound monitoring can sometimes be of quite a lot of use. I would expect that even many of the gullible folks would get suspicious if their firewall tells them that the archive file they just executed wants to connect to an FTP!
Unquote
A malware defeating a sandbox, a VM and an AV.
Do you think outbound monitoring by a firewall will help in this case? Can firewall prevent privacy info being exfiltrated?
How to prevent a malware from defeating 3 security apps (a sandbox, a VM and an AV/AM) in today's context say just ignore the outbound monitoring by a firewall? Add another security app? Like what in this case?
Last edited: