ATLAS Landscape
AML.T0097

Virtualization/Sandbox Evasion

Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use several methods to accomplish Virtualization/Sandbox Evasion such as checking for security monitoring tools (e.g., Sysinternals, Wireshark, etc.) or other system artifacts associated with analysis or virtualization such as registry keys (e.g. substrings matching Vmware, VBOX, QEMU), environment variables (e.g. substrings matching VBOX, VMWARE, PARALLELS), NIC MAC addresses (e.g. prefixes 00-05-69 (VMWare) or 08-00-27 (VirtualBox)), running processes (e.g. vmware.exe, vboxservice.exe, qemu-ga.exe) [\[1\]][1]. [1]: https://research.checkpoint.com/2025/ai-evasion-prompt-injection/

Severity CVE CVSS
CRITICAL CVE-2026-0863 9.9
HIGH CVE-2024-6982 8.4
HIGH GHSA-4675-36f9-wf6r
UNKNOWN CVE-2025-66479
UNKNOWN CVE-2026-2287
UNKNOWN CVE-2026-2275