VirtualBox Hardened Loader x64 (kernelmode.info)
VirtualBox Hardened VM detection mitigation loader x64 from kernelmode.info.
Step by step guide for VirtualBox Hardened (4.3.14+) VM detection mitigation configuring. PHP Code:
Quote:
PHP Code:
|
May I ask to explain a bit more?
|
Quote:
EP_X0FF has made a great job by releasing and sharing (tut and tool with source) VM detection mitigation for (VirtualBox) |
So if I give u a custom Hwid that has a soft tied to HDD and BIOS can this VirtualBox emulate them?
|
>Project comes with full source code. In order to build from source you need: Microsoft Visual Studio 2013 U4 and later versions for loader build. Windows Driver Kit 8.1 U1 and later versions for driver build.
vbox AFAIK has a lot of drivers, what about signing them for correct usage udner win7+? |
Quote:
|
Quote:
I have not yet replaced or modified the (Tables) provided by EP_X0FF. Quote:
|
what about vmware ??, alot of guys use it .
|
Quote:
|
Updated...
Quote:
|
Quote:
|
Yes, releasing something (vulnerability/exploit) that can be used for malicious purposes by bad guys is always problematic, but IMHO expose a vulnerability (to the author first, then to the public after that the fix was released) can help developers and users to be better protected.
In VM detection case, EP_X0FF work around known tricks used by malware authors in real life, and malware authors also search what is new (Underground/Private forums). Do not expose these tricks lead to more victims. Collect and expose all VM detection tricks in open source project can help also all RCE Newbies to better learn and test binary analysis. |
I have previously tried vbox , but its is slow compared to vmware workstation. how much performance hit will i get disabling the 2d/3d accelerations and these customizations
|
Loader has been updated for VirtualBox 4.3.28, UEFI - available on the github repository previously mentioned.
|
EP_X0FF is a long time good friend of mine. He makes such tools not for malicious usage.
|
I Agree with you!
I appreciate a lot his works (old and new) (open source/closed source/PoCs and more...) and specially his coding style (Delphi 5/C/C++/Native API). Repo recently created! PHP Code:
PHP Code:
Quote:
|
thanks bro ;)
|
it doesn't work correctly very unstable .. VMWare Workstation has a lot of secret options by manually editing the .vmx file you can make it almost undetectable .. changing the CPU IDs, disabling the VMWARE Tools, reflecting the host information to virtual machine .. using the Actual Hard drive instead of Virtual Machine controller .. , changing the ethernet mac address, memory addresses, ........ I was unable to get this software to work but by Modifying Vmware using a Custom BIOS I was able to defeat all the targets with virtual machine detection in VMWare Environment ..
|
Quote:
Yes, even I do some of the stuff that you mentioned but a sample VMX file (as well as the custom BIOS taht actually works) as an example would be nice :) Maybe as a PoC, we can see if it can bypass the Anti-VMWare/VM functions of the VMProtect v3.xx without needing to make any changes to the actual protected executable. Am sure would be an interesting exercise ... Thank you.. |
Quote:
|
I will make an article and will share it ..
You can verify your system file with this : https://github.com/LordNoteworthy/al-khaser there are two main difficulty .. assigning actual hard drive to virtual machine to avoid using the VMWare IDE/SCSI/SATA Controller and BIOS patching .. you need to extract the BIOS and Change the VMWare values in the BIOS , modify the .vmx file to read your modified BIOS .. I will share everything in that article .. |
Quote:
Quote:
What I ( and I presume others following this thread) are looking for, is mainly an account of how you actually managed to achieve it, so that we could possibly replicate it . Articles are numerous and while they are useful, since you'd specifically stated earlier in this thread that "I was unable to get this software to work but by Modifying Vmware using a Custom BIOS I was able to defeat all the targets with virtual machine detection in VMWare Environment .. " , we are looking to see a practical example of how you managed to accomplish it... In fact, content from this repo is still relevant but seems to fail when attempting to bypass the VM Check of VMP 3.1 .. These steps still continue to work on a majority of targets... As I said earlier, a good PoC would be if you could show us an example of how a VM Check of an executable protected with VMProtect >v3.1 could be bypassed without any modification to the executable (or to its image in memory using a loader etc) itself, as we are already well aware of how to do so when we are allowed to patch the executable or its memory space. Thank you :) |
All times are GMT +8. The time now is 11:15. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX