Jump to content

REGITDept

Honorary Members
  • Posts

    201
  • Joined

  • Last visited

Posts posted by REGITDept

  1. Dear Malwarebytes,

    Whenever we went to this website "https://ceasattachments.com". Malwarebytes would pop-up with a block "structurecdn.thememove.com(204.48.23.106:65017)".

    Please let us know whether this is a false positve or malicious?

    Thanks.

  2. On 7/17/2020 at 6:10 PM, exile360 said:

    Greetings,

    Please refer to the Real-Time Protection section of this support article where it says Exploit Protection.  Once there within settings, locate the bullet point which says Exploit Protection, then in settings in the UI click the link Manage Protected Applications and use the Add button shown in the image in the Protected Applications list to add calc.exe as a shielded app so that Exploit Protection will monitor it since this is the process used by the test tool.  Once it has been added you should be able to run the test and see a detection.

    Additionally, you may also test Web Protection by visiting iptest.malwarebytes.com which should result in a block along with a browser redirect to the Malwarebytes block information page indicating why the site was blocked.  You may also ping the site or its IP if you want to test non-browser processes; any connection to or from the site should be blocked system wide and this is true for any sites categorized as threats by Malwarebytes.

    Testing the core Malware Protection component should be fairly straightforward; pretty much any common Potentially Unwanted Program such as a bundled installer, junk registry cleaner/system optimizer or similar apps (the scammy ones that show tons of "critical" issues but require payment to "fix" them for you) along with driver updaters and other snakeoil type apps.

    I hope this helps.

    Perfect !

    You have answered my question.

    Thank you so much for the help.

  3. On 7/4/2020 at 2:36 PM, shadowwar said:

    Please see here:

    https://www.malwarebytes.com/upgrade/mbes-to-ep

    or

    https://www.malwarebytes.com/upgrade/mbes-to-teams

    I am just in research so i dont really have the sales knowledge. The product has a client that runs on the machine but is cloud managed. 

     

    Malwarebytes Endpoint Security product will be discontinued/end of life  on August 4, 2021

     

    Thank you for the info.

    We didn't know Malwarebytes Endpoint Security will be end of life soon.

    How come we never receive any email notice?

    Thanks.

  4. On 7/1/2020 at 10:34 AM, shadowwar said:

    You may want to talk to your business rep but i believe you would have to upgrade to the cloud version. 

     

    shadowwar,

    But isn't this more of a different product than an upgrade? One is cloud-based, and one is on premise based?

    We would like to see an update to the on premise.

    Thanks.

  5. On 6/25/2020 at 5:16 AM, shadowwar said:

    Just a tip. May want to see about upgrading to the latest available version. Whitelisting and protection are greatly improved and things like this should not happen with the latest version available. 

    shadowwar,

    There is a newer version under the Malwarebytes Endpoint Security?

    Thanks.

  6. 3 minutes ago, cli said:

    I thought there might be additional logs in there.
     

    Also, it's odd because I scanned the files in Quarrantined.zip and not seeing any of them being detected. For example, 

    windows_wlan.exe - Backdoor.RevengeRAT.MSIL
    https://www.virustotal.com/gui/file/da77035d3363da6f57ae6cce593a6cd77ac630f3aff1c94f35df4ea31e3aea71/detection
     

    Excel.exe  - Trojan.Malpack.VB

    https://www.virustotal.com/gui/file/fa70b41c7e3c7a9122132524a5db3b2f48da9568c36bd97b71e78bc523d2a146/detection

     

    I'm going to continue digging.

    Yes, very weird because it only happened once to only this one client.

    Thanks.

  7. 1 hour ago, tetonbob said:

    Hi @REGITDept- thanks for the logs and the file. According to the logs, the executable was detected and quarantined as your screenshot shows, but subsequently whitelisted on our end on the same day. Further detections by the ArwSDK as shown in the logs were no longer quarantined. Reference the MBAMService.log.bk5 on 4/14

    Are you still seeing detections on this file?

    As for the \ArwDetections folder being empty, if you're using the Manangement Console, the detections jsons are actually handled differently than with the unmanaged ARW standalone. Once the detection jsons are parsed by the Agent on the endpoint and sent to the Console, they are removed from that local directory.

     

    Did Malwarebytes fixed the issue yet?

    What I did was I put an exclusion inside the policy.

    Let me know so I can remove the exclusion once fixed on Malwarebytes' side.

    Thanks.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.