Jump to content

RobinCM

Members
  • Content Count

    12
  • Joined

  • Last visited

Everything posted by RobinCM

  1. see attached. Thanks again. SageDLLs.zip
  2. Thanks. Do you want me to upload any of the other affected DLLs? They're all showing the same malware, all have similar names and all sit in the same folder.
  3. here's the raw dll. There's several other DLLs with similar names also triggering detection. VirusTotal shows MalwareBytes as the only engine that thinks this file is bad. Eureka.MMS126.SaveAndDespatch.dll.zip
  4. I sent the hash to virustotal and nothing was found. Is there a rough ETA (or SLA) for some kind of response on this? I am a paying customer of MalwareBytes Business. Thanks.
  5. Now attached with no password (I'd assumed that without a password MalwareBytes on my desktop PC would just immediately quarantine the file inside the zip...) no_password.zip
  6. This is being detected as a Backdoor.RevengeRAT but I suspect it's just part of the normal operation of an old version of Sage accounts package. Please can you investigate? MalwareByte's actions are causing the Sage application to crash. Zip password is: password Quarantine.zip
  7. How can I disable SSL 3.0 on the MBMC server? Thanks.
  8. It'd be nice if you could eliminate the requirement for .net framework for the business version of MalwareBytes. I had to install this onto all my endpoints when I bought MB Anti-Malware, which is kind of ironic - massively increase my attack surface in order to run some defensive software.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.