malwareresearch | Unsorted

Telegram-канал malwareresearch - Malware Research

9630

Group for Malware Analysts. Pinned message with resources and rules: https://t.me/MalwareResearch/38033

Subscribe to a channel

Malware Research

I remember uploading my programs to virustotal virtual boxes, and there I collected information on how these machines were detecting our malware at the time, the amazing thing I found was that at that time the vulnerability was in mouse inactivity on their machines, and we bypassed these machines in a similar way:

POINT pos1, pos2;

g_winapi.GetCursorPos(&pos1);
g_winapi.Sleeping(2000);
g_winapi.GetCursorPos(&pos2);

if ((pos1.x == pos2.x) && (pos1.y == pos2.y))
g_winapi.ExitProcess(1);

Читать полностью…

Malware Research

That s are advanced concept for me

Читать полностью…

Malware Research

and on 2024 we have systems like "anti-analysis", "anti-debugging"

Читать полностью…

Malware Research

obfusication of malware code, droppers of dlls, hiddne imports, you just cannot detect this

Читать полностью…

Malware Research

If u want to use tor you have to know to thing: a Good malware cannot be detected

Читать полностью…

Malware Research

cleaned up all messages

Читать полностью…

Malware Research

Well, you definitely need an antivirus program. I would also recommend you to use Tor

Читать полностью…

Malware Research

What do you exactly mean by this?

Читать полностью…

Malware Research

Jo hablo portugues es un poco parecido al español.

Читать полностью…

Malware Research

Someone speak spanish?

Читать полностью…

Malware Research

New FedBan
Fed: Libra's Empire
FedAdmin: ❤🦦
User: Simo
User ID: 5324413521
Reason: illegal activity

Читать полностью…

Malware Research

Can you help me to hack this app

Читать полностью…

Malware Research

that's related to browsers right? or a PDF file can trigger it?

Читать полностью…

Malware Research

I haven't seen them since 2015 or 2016, so I doubt so

but PDF with phishing links still exist 🙈

and yes, they get past the filters. I don't know this tech (email gateways) well enough to know why

Читать полностью…

Malware Research

thank you @Libranalysis and @xiaomayi

Читать полностью…

Malware Research

I know what u mean but I don’t know in deep that concept

Читать полностью…

Malware Research

With a Good obfuscation the api call will not be detected

Читать полностью…

Malware Research

I have try to code malware

Читать полностью…

Malware Research

Thanks, i know i can’t became a malware analyst, but when i start study i see that: Good virus are undetectable. My pc is full of malware, yes, but i know is my fault ahahah

Читать полностью…

Malware Research

Sorry, maybe if u need an antivirus for the crap u download u can’t use tor

Читать полностью…

Malware Research

anyway, off topic. please move to /channel/LibraLair to continue

Читать полностью…

Malware Research

My question is what additional security can I use on my PC other than VPN?

Читать полностью…

Malware Research

I have a number of questions, what cybersecurity can I use other than a VPN to do serious things?

Читать полностью…

Malware Research

aqui pura gente que habla ingles

Читать полностью…

Malware Research

User Adrian has 1/3 warnings; be careful!
Reason:
stay on-topic please

Читать полностью…

Malware Research

There transit a lot of money

Читать полностью…

Malware Research

Some one who play poker bros here ??

Читать полностью…

Malware Research

there was a recent pdf.js vulnerability

Читать полностью…

Malware Research

is #4 still a thing? I mean do modern anti phishing email kits let PDFs w/ JS pass by?

Читать полностью…

Malware Research

those are many years ago, and till date, I've never quite seen them already, probably since around 2015/2016

1. To create phishing pages
2. To create phishing + drive-by downloads
3. For drive-by downloads
4. PDF JS malware

But I've seen some cases of:

1. Injection into ads that the website uses. If user doesn't have adblocker or similar protection, it could lead to drive-by downloads or on payment pages, stealing of their credit card details
2. Injection into websites to compromise them. Similar impact as #1

Читать полностью…
Subscribe to a channel