Jump to content
DC_dent

Will Malwarebytes identify hidden or encrypted malware installed on HDD?

Recommended Posts

Hello,

This is my first post here. I use Malwarebytes Premium on my computers home and very happy with it. 

I recently bought a used computer off eBay; its hard disk drive has Windows 7, some optimization tools from dell and apparently nothing else.

The computer is a Dell 3620 workstation that was most likely used for business purposes. 

I installed and ran latest Malwarebytes premium and it didn't find anything bad.  the Windows Defender also didn't find anything bad.

However, I'm afraid that the computer might contain some malware in a hidden or encrypted state that could later activate and do bad things. 

My question is: are Malwarebytes capable of finding cryptic or hidden malware that might be inactive now?

 

Thank you.  

   

 

Share this post


Link to post
Share on other sites

***This is an automated reply***

Hi,

Thanks for posting in the Malwarebytes 3 Help forum.

 

If you are having technical issues with our Windows product, please do the following: 

Spoiler

If you haven’t already done so, please run the Malwarebytes Support Tool and then attach the logs in your next reply:

NOTE: The tools and the information obtained is safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system.

  • Download Malwarebytes Support Tool
  • Once the file is downloaded, open your Downloads folder/location of the downloaded file
  • Double-click mb-support-X.X.X.XXXX.exe to run the program
    • You may be prompted by User Account Control (UAC) to allow changes to be made to your computer. Click Yes to consent.
  • Place a checkmark next to Accept License Agreement and click Next
  • You will be presented with a page stating, "Welcome to the Malwarebytes Support Tool!"
  • Click the Advanced Options link

    welcome mbst.png
     
  • Click the Gather Logs button

    gatherlogs.png
     
  • A progress bar will appear and the program will proceed to gather troubleshooting information from your computer
  • Upon completion, click OK
  • A file named mbst-grab-results.zip will be saved to your Desktop
  • Please attach the file in your next reply. Before submitting your reply, be sure to enable "Notify me of replies" like so:

     notify me.jpeg  


    Click "Reveal Hidden Contents" below for details on how to attach a file:
     
    Spoiler

    To save attachments, please click the link as shown below. You can click and drag the files to this bar or you can click the choose files, then browse to where your files are located, select them and click the Open button.

    mb_attach.jpg.220985d559e943927cbe3c078b
     

One of our experts will be able to assist you shortly.

 

If you are having licensing issues, please do the following: 

Spoiler

For any of these issues:

  • Renewals
  • Refunds (including double billing)
  • Cancellations
  • Update Billing Info
  • Multiple Transactions
  • Consumer Purchases
  • Transaction Receipt

Please contact our support team at https://support.malwarebytes.com/community/consumer/pages/contact-us to get help

If you need help looking up your license details, please head here: https://support.malwarebytes.com/docs/DOC-1264 

 

Thanks in advance for your patience.

-The Malwarebytes Forum Team

Share this post


Link to post
Share on other sites

If Malware exists in an encrypted state, it would require a decryptor to bring it out of its dormant state and resurrect it as a malicious executable binary.

For example, if it is placed in an archive file Malwarebytes and other anti malware would still detect it.  Thus it would have to be a password protected archive file.  That would require an external utility to employ said password and extract the malicious binary.  Another example would be a graphic utilizing steganography to embed a malicious binary.  It too would require an external utility to extract the malicious binary.  The utility used for such extraction would itself be a subject for anti malware detection.

** I always tell people, if you buy a used computer, the very first thing to do is to wipe the PC and reinstall the OS of choice on it.

Edited by David H. Lipman
Edited for content, clarity, spelling and grammar

Share this post


Link to post
Share on other sites

Thank you David,

I got the same advice from other people and still not sure. The seller said he did exactly this: wiped the hard drive that came with the system. I also don't have an unused Windows copy sitting around. 

Share this post


Link to post
Share on other sites

If the seller did install the OS from scratch, chances are low that it would have even some Dell software.  That usually comes preinstalled from the factory.  The proof in the pudding would be the dates in the Control Panel Applet -->  Programs and Features.  IFF the OS was wiped and reinstalled and then sold, it would have a very recent list of dates of those programs/utilities that were installed.

BTW:  The Windows 7 OS License is built into the system.  You can obtain Windows 7 installation media from Dell.

 

It is up to you.

 

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.