This dataset is no longer available and has a current status of 'Withdrawn'.
Please see the catalog for a listing of currently available datasets.
This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1219
al-khaser
External Tool
External Data Source
GitHub
Unknown
Unknown
56 (lowest rank is 56)

Category & Restrictions

Other
cyber attack, malware
Unrestricted
true

Description


Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

al-khaser is a PoC    malware    application with good intentions that aims to stress your anti-malware system. It performs a bunch of common malware tricks with the goal of seeing if you stay under the radar.

Additional Details

2.2KB
false
Unknown
khaser, al, al-khaser, 1219, external, inferlink corporation, inferlink, corporation, external data source, source, malware, public, machine, techniques, virtual, wild, debuggers, sandbox, emulation, detection, goal, performs, bunch, common, anti, application, system, radar, stress, stay, other, intentions, aims, poc, tricks