Sandbox Evasion
Here is a list of things on the client side that can help you detect sandboxes and halt execution if found in one(so the Av doesn't get to see how our payload operates and evades heurisitic detections)
• Usernames
• Domain membership
• Zone Identifier
• Computer resources
• Process names
• Recent files
• Current file name
• BIOS information
• CPU Cores
• Installed Drivers
• Multiple executions
• Environment Variables
• Mouse movements
For more info: https://github.com/a0rtega/pafish/tree/master/pafish
Last updated
Was this helpful?