I published the following diary on isc.sans.edu: “Sandbox Evasion… With Just a Filename!“:
Today, many sandbox solutions are available and deployed by most organizations to detonate malicious files and analyze their behavior. The main problem with some sandboxes is the filename used to submit the sample. The file can be named like “sample.exe”, “suspicious.exe”, “<SHA256>.tmp” or “malware.tmp”… [Read more]
The post [SANS ISC] Sandbox Evasion… With Just a Filename! appeared first on /dev/random.
Click to Open Code Editor