{
	"id": "feab16d1-d00f-4a45-8fde-372f9344a6c7",
	"created_at": "2026-04-06T00:19:14.881546Z",
	"updated_at": "2026-04-10T03:20:48.232979Z",
	"deleted_at": null,
	"sha1_hash": "871e44376c02f3447126045c63e33d7cee4cbf40",
	"title": "Detecting Malware and Sandbox Evasion Techniques",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28915,
	"plain_text": "Detecting Malware and Sandbox Evasion Techniques\r\nBy Created by:Dilshan Keragala\r\nArchived: 2026-04-05 19:19:59 UTC\r\nSystem integrity is a cardinal component of information security. It ensures that information systems operate\r\nwithin some desirable limits. Internet security threats such as malware and highly malicious programs are on the\r\nrise, resulting in the necessity for extensive research efforts to develop mechanisms that can counter various\r\nthreats. Malware Sandbox analysis is an effective mechanism having received propositions as a potential solution.\r\nWhen using Malware Sandbox analysis, samples of malware are executed to determine their behaviors. The\r\nresults of this action are then recorded for subsequent study. This paper first will explain the nature of malware,\r\nthen discuss the available methods to detect and control various malware activities. Finally, it will examine the\r\ngeneral Sandbox structure, with a major focus on a novel behavior based malware detection method leveraging\r\nSandbox-evasion behaviors as an avenue to detecting, mitigating or totally evading the malware.\r\nSource: https://www.sans.org/reading-room/whitepapers/forensics/detecting-malware-sandbox-evasion-techniques-36667\r\nhttps://www.sans.org/reading-room/whitepapers/forensics/detecting-malware-sandbox-evasion-techniques-36667\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.sans.org/reading-room/whitepapers/forensics/detecting-malware-sandbox-evasion-techniques-36667"
	],
	"report_names": [
		"detecting-malware-sandbox-evasion-techniques-36667"
	],
	"threat_actors": [],
	"ts_created_at": 1775434754,
	"ts_updated_at": 1775791248,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/871e44376c02f3447126045c63e33d7cee4cbf40.pdf",
		"text": "https://archive.orkl.eu/871e44376c02f3447126045c63e33d7cee4cbf40.txt",
		"img": "https://archive.orkl.eu/871e44376c02f3447126045c63e33d7cee4cbf40.jpg"
	}
}