free

News

collapse

User Info

 
 
Welcome, Guest. Please login or register.
Did you miss your activation email?

* Who's Online

  • Dot Guests: 165
  • Dot Hidden: 0
  • Dot Users: 0

There aren't any users online.

* Birthday Calender

November 2025
Sun Mon Tue Wed Thu Fri Sat
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 [18] 19 20 21 22
23 24 25 26 27 28 29
30

Detecting Malware

tsghmike · 415

0 Members and 1 Guest are viewing this topic.

Offline tsghmikeTopic starter

  • [SA:MP] Judge
  • Regular
  • **
    • Posts: 329
  • Fu*k the internet; it took away your intellect
  • With us since: 07/03/2011
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
    • Oxyhost
on: September 16, 2011, 08:26:21 am
When searching for malware there are two areas that may prove fruitful - the file system and the registry. There are a number of tools available that can provide the necessary information, some such as HijackThis focus mainly on the registry while others such as DDS cover both areas.

One important issue for the malware writer is to keep his/her creation safe from detection and subsequent removal, and choosing the right name for the file is a key part of that. Knowing some of these choices will enable us to better spot these files when reviewing the various logs that we may come across. Some options are as follows:

1) The random filename. Example: adsgruda.exe

This is generally not a good idea as nothing quite shouts malware as a meaningless filename. It is only the work of a minute or two to run the filename through the search engine of your choice and, although you should never assume that random always equals bad, few or no hits is very good evidence that closer inspection is necessary.

2) The meaningful filename. Example: servicehost.exe

Definitely a better choice than the first for passing a brief inspection, but a little research will again show their true colours. Never assume that just because it looks legitimate, that it is.

3) The nomadic filename. Example: spoolsv.exe

The trick with this one is to use a legitimate filename but place it in a different folder to normal. The example above is normally found in the WINDOWS\system32 on XP, so C:\WINDOWS\system\spoolsv.exe should sound the alarm bells.
Always pay attention to the location when researching a file as it may be the key to solving the problem.

4) The squatter filename. Example: C:\Program Files\Acronis\TrueImage\TimounterMonitor.exe

With the advent of security programs that monitor the registry looking for the creation of autostart instructions, one method of getting around this is to look for orphaned entries. Sadly not all programs remove everything that they originally created and, in this age of recycling, if a quick scan of the registry finds one such entry this will provide both a name and location for the malware and also avoid the need to try and bypass the security to get the malware started.

As both the filename and location are legitimate, research will draw a blank here. Cross-referencing the installed programs with the registry entries will allow you to see if any don't belong and while they may not be anything other than leftovers, good housekeeping will see them removed and ruled out as malicious.

Checking for the creation of new files on the date that any problems first occurred is another option here, which is why newer tools provide this information.

5) The identity theft filename. Example: C:\Windows\System32\drivers\atapi.sys

It is possible to replace a legitimate file such as the one above with a malicious version and relocate the legitmate one to another folder. Now when the legitmate file is called the malicious one will become active instead and it can in turn call the legitimate one, which should leave the user none the wiser.

A similar approach is to add malicious instructions to a legitmate file and these will be carried out when the legitimate file is called.

The danger when facing the removal of this infection is that the infected/replaced file will be removed and this can spell the death of the current installation depending of the file in question. Whether you delete the infected file or the malicious one that calls the legitimate one, you deprive the system of legitmate instructions and this could prove to be a disaster if these instructions are vital to the system. This is a very good reason for sticking to online scanners that have no removal capability, such as Kaspersky, or have one which can be disabled, such as ESET.

File sizes and MD5 checksums are helpful here, that and a softly-softly approach to removal.


Medal of Loyalt x1


Offline Exterminator

  • Hero
  • ****
    • Posts: 2232
    With us since: 17/04/2011
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
  • SA:MP: Philip_Ancelotti
Reply #1 on: September 16, 2011, 07:49:59 pm
You forgot to add Anti-virus software, mike.

Tho i personally recommend the guardian av, since if your pc is infected by a malware and the AV doesnt recognise it, like with all Indian products it offers a amazing customer support.You can call them free of charge expert advice to actually have them take control of your PC if you wish and remove the malware manually...Loving it, saved my ass thrice...


Philip_Ancelotti - Clans & Groups Moderator - Ancelotti Boss


Offline Dolfagr

  • Veteran
  • ***
    • Posts: 1772
    With us since: 31/01/2008
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Reply #2 on: September 16, 2011, 08:42:48 pm
Malware Bytes works great for me, I suggest it to everyone.  :)



Offline Gandalf

  • Owner
  • *******
    • Posts: 15956
    With us since: 12/07/2006
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Reply #3 on: September 16, 2011, 09:34:25 pm
To remove malware you can now and then use programs like hitman pro, which installs a number of malware tools to run them. As malware removal programs are usually not complete in their work it does not hurt to have several programs installed.

As for virus scanners the opposite is true. Use just one single anti-virus program as using more than one often results in vulnerabilities and memory conflicts.

And one more tip... never EVER agree with an anti-malware download that suddenly pops up. If you suspect having malware, search for well-known removal tools and do not fall for tools that will just install other malware..

Do not roleplay a veteran on discord, be a veteran in game.


Offline tsghmikeTopic starter

  • [SA:MP] Judge
  • Regular
  • **
    • Posts: 329
  • Fu*k the internet; it took away your intellect
  • With us since: 07/03/2011
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYearsYears
    • Oxyhost
Reply #4 on: November 18, 2011, 02:46:17 pm
To remove malware you can now and then use programs like hitman pro, which installs a number of malware tools to run them. As malware removal programs are usually not complete in their work it does not hurt to have several programs installed.

As for virus scanners the opposite is true. Use just one single anti-virus program as using more than one often results in vulnerabilities and memory conflicts.

And one more tip... never EVER agree with an anti-malware download that suddenly pops up. If you suspect having malware, search for well-known removal tools and do not fall for tools that will just install other malware..
I am going to be coming up with a lot more for section now that I am a HJT teacher and less busy with that.


Medal of Loyalt x1


 


free
free
SimplePortal 2.3.7 © 2008-2025, SimplePortal