GET /api/techniques/36/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 36,
    "key": "detecting-usb-drive",
    "unprotect_id": "U1310, B0009.016",
    "name": "Detecting USB Drive",
    "description": "To detect whether a program is running in a sandbox environment, malware can look for the presence of USB drives. Many sandboxes do not have USB ports or do not allow access to USB drives, and detecting the absence of USB drives can help identify whether the program is being run in a sandbox.",
    "resources": "https://www.first.org/resources/papers/conf2017/Countering-Innovative-Sandbox-Evasion-Techniques-Used-by-Malware.pdf",
    "creation_date": "2019-03-11T08:18:05Z",
    "tags": "sandbox, program, USB drives,",
    "modification_date": "2023-10-04T10:42:11.257000Z",
    "category": [
        1
    ],
    "rules": [],
    "attachments": [],
    "featured_api": [
        594,
        595
    ],
    "contributors": []
}