Astroidv2 -
4.1 Anti-VM and Anti-Sandbox 4.2 API Hooking Detection
(Example: MITRE ATT&CK mapping, VirusTotal comparisons) Context B: Space Engineering (Asteroid Mining Simulation) Title: AstroidV2: A High-Fidelity Simulator for Near-Earth Asteroid Resource Prospecting astroidv2
This paper presents a comprehensive analysis of AstroidV2, a successor to the previously undocumented Astroid malware family. Leveraging a hybrid command-and-control (C2) architecture combining DNS tunneling and decentralized Telegram bot APIs, AstroidV2 demonstrates a 40% improvement in network evasion compared to its predecessor. We detail its anti-analysis techniques, including environmental keying, sleep obfuscation, and direct system call invocation. A reverse-engineered sample reveals modular capabilities for keylogging, credential theft, and lateral movement via SMB. Defensive recommendations include network-level DNS filtering and memory signature detection. including environmental keying
2.1 Dynamic gravity modeling 2.2 Material composition mapping and direct system call invocation.
1.1 State of asteroid mining simulations 1.2 Limitations of AstroidV1
