Running suspicious software in a virtual machine seems like a basic precaution to figure out whether said software contains naughty code. Unfortunately it’s generally rather easy to detect whether or not one’s software runs inside a VM, with [bRootForce] going through a list of ways that a VirtualBox VM can be detected from inside the guest OS. While there are a range of obvious naming issues, such as the occurrence of the word ‘VirtualBox’ everywhere, there many more subtle ways too.
Demonstrated is the PoC ‘malware’ application called Al-Khaser, which can be used to verify one’s anti-malware systems, such as when trying to unleash a debugger on a piece of malware, run it inside a VM, along with many more uses. Among its anti-virtualization features are specific registry key names and values, file system artefacts, directory names, MAC addresses, virtual devices, etc.
In order to squeeze by those checks, [bRootForce] created the vbox_stealth shell script for Bash-blessed systems in order to use the VirtualBox Manager for the renaming of hardware identifier, along with the VBoxCloak project’s PowerShell script that’s used inside a Windows VirtualBox guest instance to rename registry keys, kill VirtualBox-specific processes, and delete VirtualBox-specific files.
Making A Virtual Machine Look Like Real Hardware To Malware | Hackaday
Submitted 3 days ago by cm0002@lemmy.zip to cybersecurity@infosec.pub
https://hackaday.com/2025/10/27/making-a-virtual-machine-look-like-real-hardware-to-malware/
Tramort@programming.dev 2 days ago
why not go the other way, and make your computer look like it’s a VM when it’s not?
if malware writers didn’t want to run in a VM then great! you are protected.
Atherel@lemmy.dbzer0.com 2 days ago
Because there’s other software you want to run but doesn’t when it detects a vm. And you don’t want to publish how to run that software in a vm because of lawyers.