GET /api/techniques/388/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 388,
    "key": "kernel-flag-inspection-via-sysctl",
    "unprotect_id": "U0135",
    "name": "kernel flag inspection via sysctl",
    "description": "The `sysctl` anti-debugging technique can be abused by malware to detect and evade debugging tools on macOS or BSD-like systems. By querying the kernel for process information, malware checks flags (e.g., `0x800`) to see if a debugger is attached. If detected, the malware can terminate, alter behavior, or enter a dormant state to avoid analysis. \r\n\r\nThis technique blends with legitimate system calls, it makes detection harder, and allow to bypass sandboxes analysis. BANSHEE Stealer (`11aa6eeca2547fcf807129787bec0d576de1a29b56945c5a8fb16ed8bf68f782`) uses this method to evade reverse-engineering and maintain stealth.",
    "windows": "",
    "linux": "",
    "macos": "",
    "resources": "https://www.elastic.co/security-labs/beyond-the-wail",
    "creation_date": "2025-01-11T03:00:07.056523Z",
    "tags": "",
    "modification_date": "2025-01-11T03:40:25.992268Z",
    "category": [
        3
    ],
    "rules": [],
    "attachments": [],
    "featured_api": [],
    "contributors": []
}