Jump to content

pifreak

Honorary Members
  • Posts

    98
  • Joined

  • Last visited

Posts posted by pifreak

  1. yeah I was just wondering and didn't want you to do that. Just curious how some scanners use <some method> to find that something bad is in a program without that program being discovered yet/in a database.

    Also wondering if malwarebytes has taken advantage of such a method.

    That's all, thanks for the timely reply!

    pi`

  2. I am curious how malwarebytes does it's detection, well for a few reasons.

    I was messing with the koobface virus and I hex edited one byte of test; malwarebytes didn't find it as an infection anymore.

    The other reason is because 3 programs on virscan.org found one of my programs to be a virus, and it's never been released on the net.

    Is there any such scanning, looking through the program, not just the checksum/filename/etc ?

    The text in the koobface virus is interesting, it includes words/phrases such as "Company Name"/ "Skype"

    The hex edit I performed was changing Skype to Snype.

    Have the file if you want it, don't run it unless you are testing/know what you are doing because it is the koobface/facebook virus.

    setup.exe = original koobface

    _setup.exe = 1 byte edited

    Sorry for making so many posts on the forum as a new member, I just like learning things. Sorry to bother.

    pi`

    files.zip

  3. I read the topic about atapi.sys and I've never heard of such a file, but a full scan by malwarebytes found this.

    I don't know what it is, and I don't have any problems with my machine.

    Hex editing (a copy of) the file by one byte made the scan return no malware.

    This was found on the partition of Windows XP Professional 32-bit

    "C:\WINDOWS\$NtServicePackUninstall$\atapi.sys (Rootkit) -> Quarantined and deleted successfully."

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.