From 4cda4b058641cbf0dc14fe465368cd31fa196c91 Mon Sep 17 00:00:00 2001 From: Alexey Bukhteyev <46046582+chkp-alexeybu@users.noreply.github.com> Date: Tue, 9 Jul 2024 18:24:00 +0300 Subject: [PATCH] Added evasions from Styx Stealer --- _src/Evasions/techniques/processes.md | 19 +++++++++++++++++-- 1 file changed, 17 insertions(+), 2 deletions(-) diff --git a/_src/Evasions/techniques/processes.md b/_src/Evasions/techniques/processes.md index 43ed7ad..5990290 100644 --- a/_src/Evasions/techniques/processes.md +++ b/_src/Evasions/techniques/processes.md @@ -129,7 +129,7 @@ bool check_process_is_running(const std::string &proc_name) { vmusrvc.exe - VMware + VMware vmtoolsd.exe @@ -147,6 +147,9 @@ bool check_process_is_running(const std::string &proc_name) { vmount2.exe + + vmwareservice.exe + Xen xenservice.exe @@ -154,14 +157,26 @@ bool check_process_is_running(const std::string &proc_name) { xsvc_depriv.exe + + QEMU + qemu-ga.exe + WPE Pro WPE Pro.exe + + KsDumper + ksdumperclient.exe +
-Note: WPE Pro is a sniffer, not VM, however it is used along with VM detects. +Notes: +

1.2. Check if specific libraries are loaded in the process address space