VM Detection attempt on Linux

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

ATT&CK Tactic

ATT&CK Technique

Virtualization/Sandbox Evasion: System Checks (T1497.001)

Severity

Informational

Description

A Process executed a command and/or accessed a file that can be used to detect VM environments.

Attacker's Goals

Avoid malware analysis by identifying execution from within sandboxes and virtual machines.

Investigative actions

  • Review the process for additional malicious actions.
  • Check for any additional alerts raised within the same context of the script.

Variations

VM Detection attempt on Linux with further reconnaissance commands

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Medium

Description

A Process executed a command and/or accessed a file that can be used to detect VM environments.

Attacker's Goals

Avoid malware analysis by identifying execution from within sandboxes and virtual machines.

Investigative actions

  • Review the process for additional malicious actions.
  • Check for any additional alerts raised within the same context of the script.


VM Detection attempt on Linux using an unpopular technique

Synopsis

ATT&CK Tactic

ATT&CK Technique

Virtualization/Sandbox Evasion: System Checks (T1497.001)

Severity

Low

Description

A Process executed a command and/or accessed a file that can be used to detect VM environments.

Attacker's Goals

Avoid malware analysis by identifying execution from within sandboxes and virtual machines.

Investigative actions

  • Review the process for additional malicious actions.
  • Check for any additional alerts raised within the same context of the script.