Jump to content

EICAR test file?

Recommended Posts

That said, if a threat does manage to get past Malwarebytes, specifically one which could be easily detected by an Anti-Virus engine that detects scripts, then you are more than welcome to use both Malwarebytes and an Anti-Virus product since Malwarebytes is designed to work alongside those without issues. Just don't use multiple Anti-Virus products at once.

If you happen to use Windows 10, then Malwarebytes and Windows Defender are both adequate. If you're running Windows 10 Enterprise or Windows Server 2016/2019, then you could also try using Malwarebytes alongside Windows Defender Advanced Threat Protection. However, as I do not have an Advanced Threat Protection subscription, I cannot test that to tell you if that would end well or not.

If you wanted to turn Malwarebytes into an anti-virus (which specifically targets viruses and scripts), then you would have to add another detection engine entirely, breaking its compatibility with other security products in the process.

Link to post
Share on other sites

36 minutes ago, Amaroq_Starwind said:

or Windows Server 2016/2019

Not saying it won't run, however see below, straight from the main site, running MB3 on a server is not supported, so it should not be suggested...

Software requirements
Windows 10 (32/64-bit)
Windows 8.1 (32/64-bit)
Windows 8 (32/64-bit)
Windows 7 (32/64-bit)
Windows Vista (Service Pack 1 or later, 32/64-bit)*
Windows XP (Service Pack 3 or later, 32-bit only)*
Active Internet connection

Link to post
Share on other sites


I have provided specific targeting information to you in the past.  The EICAR string does not represent a PE file and thus it will not be detected by MBAM.

MBAM is not a historical anti malware solution so it is not going to target 16bit COM and Win16 EXE files.

Now that we have come full circle and you have recommended every suggestion that you can think of, it it high time to stop questioning what MBAM can and can't do and start your own anti malware project.  Then you can incorporate all your thoughts into a tangible product and you can put your thumb print on.  You can target ELF and MVS files, 16bit DOS, CP/M, Commodore 64 Apple II and even main frames.  You can target the NYB and FORM and file infectors like the Jerusalem and Virut.

Malwarebytes' Anti-Malware is what it is targeting Win32 and Win64 files that are infecting Today's computers and in ways not perceived of when DOS ( DR/PC/MS-DOS ) was prevalent. Malwarebytes' Anti-Malware is going to shift from static signature based detections and work on actions malware takes.  The Malwarebytes' team will not concentrate on one threat or one threat actor.  They will look at the overarching concepts of malicious activities and the role software plays.

It is now time to stop bringing up any and every subject and for you to take the time to study and concentrate on one subject at a time until you understand that subject matter at-length and create your own product the way you'd like it to be.


Edited by David H. Lipman
Edited for content, clarity, spelling and grammar
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.