jake2001 Posted March 12, 2022 ID:1506560 Share Posted March 12, 2022 I would really appreciate any help! Thank you. Malwarebytes say there are no infection and but Windows defender is going crazy and say the file is malware. I uploaded it to malware analysis sandbox and it report the file Uses Process Injection, code obfuscation techniques, Defense Evasion, Persistence and Privilege Escalation. The file is java .jar file, it's on a USB stick of a friend of mine, hope I don't lose my university study material and need to wipe my laptop. 🤞 malware.zip Link to post Share on other sites More sharing options...
Root Admin Solution AdvancedSetup Posted March 13, 2022 Root Admin Solution ID:1506602 Share Posted March 13, 2022 It's a key generator designed to steal Burp Suite Pro Simply delete the file and don't play around with stuff like that. If you want to scan your own system for any possible threats please run the following Please run the following steps and post back the logs as an attachment when ready. Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed. Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed. If you still have trouble downloading the software please click on Reveal Hidden Contents below for examples of how to allow the download. Spoiler Spoiler When downloading with some browsers you may see a different style of screens that may block FRST from downloading. The program is safe and used hundreds of times a week by many users. Example of Microsoft Edge blocking the download STEP 01 If you already have Malwarebytes installed then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan. If you don't have Malwarebytes installed yet please download it from here and install it. Once installed then open Malwarebytes and select Scan and let it run. Once the scan is completed make sure you have it quarantine any detections it finds. If no detections were found click on the Save results drop-down, then the Export to TXT button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply. If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply. If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply. If Malwarebytes won't run then please skip to the next step and let me know in your next reply that the scanner would not run. STEP 02 Please download AdwCleaner by Malwarebytes and save the file to your Desktop. Double-click to run the program Accept the End User License Agreement. Wait until the database is updated. Click Scan Now. When finished, if items are found please click Quarantine. Your PC should reboot now if any items were found. After reboot, a log file will be opened. Attach or Copy its content into your next reply. RESTART THE COMPUTER Before running Step 3 STEP 03 Please download the Farbar Recovery Scan Tool and save it to your desktop.Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit Double-click to run it. When the tool opens, click Yes to disclaimer. Press the Scan button. It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply. The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here each time Please attach the Additions.txt log to your reply as well. On your next reply, you should be attaching frst.txt and additions.txt to your post, every time. Thanks Link to post Share on other sites More sharing options...
jake2001 Posted March 13, 2022 Author ID:1506680 Share Posted March 13, 2022 Windows explorer.exe try to connect to this IP "93.184.220.29" multiple times, my firewalls flag the connection. is it an IP for legit website or belong to malware? I saw many old threads on this forum and that MB was consider the IP as malware related. It's strange for explorer.exe to connect to remote IP. Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted March 13, 2022 Root Admin ID:1506695 Share Posted March 13, 2022 I've merged the posts Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted May 6, 2022 Root Admin ID:1514442 Share Posted May 6, 2022 Due to the lack of feedback, this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request. This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread. Tips to help protect from infection Thanks Link to post Share on other sites More sharing options...
Recommended Posts