New Antiexecutable: NoVirusThanks EXE Radar Pro

Discussion in 'other anti-malware software' started by sg09, Jun 3, 2011.

  1. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    That's it! :thumb:
    Fantastic! :D
    That's the picture I had in my mind...

    I would let nvt to decide what is more important...after all, he's an expert here.
    nvt, what do you think?
     
    Last edited: Mar 4, 2013
  2. Tyrizian

    Tyrizian Registered Member

    Joined:
    Apr 26, 2012
    Posts:
    2,839
    I kind of posted the second image a little late, did you get to see both images before you sent this reply?

    But of course, I'm only here to help out the best way that I can, to give a visual presentation. It's entirely up to NVT to implement or not to implement such features and or designs.
     
  3. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    I have just noticed the second image and it fits in the picture perfectly!
    :D
     
  4. Tyrizian

    Tyrizian Registered Member

    Joined:
    Apr 26, 2012
    Posts:
    2,839
    Thank you siketa :D
     
  5. arsenaloyal

    arsenaloyal Registered Member

    Joined:
    Nov 1, 2009
    Posts:
    513
    On my machines it is in the lower right hand corner of the screen. But there are a few issues with multi monitors, and with my big high resolution screen there is also an issue. NVT is aware and is working on them.

    Pete

    ^^^^^^
    I am glad to know that,because thats the problem i have as well in my laptop.
     
  6. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    nvt,
    what about self-protection? Does ERP have it?
    Can it be killed by malware without alerting user?
    Has anyone tested it?
     
  7. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Interesting question, but to kill it, doesn't the malware first have to run/
     
  8. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    Exploit can launch malware if user doesn't put "sensitive" processes in Alert list.
    The list is empty by default.

    POC....http://www.youtube.com/watch?v=5KXbnIhhODc
     
  9. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    testing this. Will report back when done, with comments and results.

    Pete
     
  10. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Okay first a couple of thoughts.

    1. I don't think a whole lot of these youtube tests. Who is the tester, did he know what he was doing. In this case he used the free version 2.65, so it is so out of data and cripple as to be meaningless. Some of his clicks were so fast it was hard to tell what he did. Finally the link to his "malware" no longer works, so we can't duplicate what he did.

    2. Security is all about layers, so I tested my setup, and finally tried as best to duplicate his scenario.

    Testing.

    First my setup. Windows XP Pro SP3. Not update for at least 2 years. FDISR,Shadowdefender,Outpost Pro 8.0,Sandboxie 3.76, Appdefend 3.4.2 and of course ERP 2.7.3

    To simulate his test, what I did was use IExplorer Version 7 in this case. (I don't use IE regularily). What I do is use the File>open and run the exe file that way. Simulates the browser contolling things.

    Test 1 I used SIW.exe from my Desktop.

    a) Appguard blocked it so I set it to off.
    b) Since the browser was in a Sandbox, with app restrictions, SBIE blocked it from running.
    c) Ran IE outside the Sandbox. With nothing else, ERP, gave me a pop up giving a choice of actions.

    SUCCESS in my book

    Test 2. I place the SIW.exe in the c: folder (that's where the testers exploit ended up.

    a) Appguard let it run, not in a user folder
    b) IE Sandbox stopped it cold.
    c) IE outside the sandbox, and ERP once again gave a pop up.

    A note here. Even in a) although appguard let it run, since IE is guarded, the exploit would also have guarded, and couldn't have hurt the system.

    Results:

    Layers work, and more importantly so does ERP!!!!

    Recommendations.

    @users:Use ERP with confidence and relax
    @NVT: Pull that free version, and get the trial going ASP.

    Pete
     
  11. novirusthanks

    novirusthanks Developer

    Joined:
    Nov 5, 2010
    Posts:
    1,359
    Location:
    Italy
    @Pete

    Thank you for the recommendations and tests :)
    In very few days we will release ERP 30-days trial version.

    @siketa

    Not at the moment, I would prefer to not add it, as a malware always needs to run to be able to terminate ERP. Same for task manager, you can blacklist it and regular users cannot terminate/kill ERP process.

    As long as you block the execution of the EXE file or you block the malicious commandline (example: taskkill.exe /PID 1234) ERP's process will not be killed.

    @RADEON0101

    You've done a super job :D

    We will take into consideration your images and siketa's suggestion and optimize the alert-dialog for the next version.

    @arsenaloyal

    Glad FUS issue is now fixed :)

    @siketa

    I tested a bit ERP with some live URLs related to recent exploit kits:

    Exploited Java, payload dropped to Temp folder and detected by ERP:
    http://postimage.org/image/45rte02az/

    Payload dropped in user folder and detected by ERP:
    http://postimage.org/image/92pjei3kl/

    Payload dropped in user folder and detected by ERP:
    http://postimage.org/image/za9c3cqj5/

    Payload uses cmd.exe to execute the EXE file, detected by ERP:
    http://postimage.org/image/6lix9cspt/
    ERP to detect this type of attack needs to not have in the whitelist the process cmd.exe or you can add it in the AlertList and be always alerted when cmd.exe is executed.

    Payloads quarantined by ERP:
    http://postimage.org/image/qqallse9v/

    MD5 hashes of quarantined payloads:
    http://postimage.org/image/ur1ovky1d/

    Here is what I have in the AlertList (64-bit OS):
    http://postimage.org/image/5dizgtiwf/
     
    Last edited: Mar 5, 2013
  12. The Red Moon

    The Red Moon Registered Member

    Joined:
    May 17, 2012
    Posts:
    4,101
    I was thinking of trying out the free version,but if it will not be supported or abandoned in the near future then i shall give it a miss.
    Good looking program though.:D
     
  13. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Hi Beethoven

    You shouldn't write this off because it isn't free. The price of admission is very low, and the product just keeps getting better and better.

    Pete
     
  14. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    You can try the trial when it comes out.
    It is far better than Free version.
     
  15. The Red Moon

    The Red Moon Registered Member

    Joined:
    May 17, 2012
    Posts:
    4,101
    Yes but a trial runs out eventually.I think i will stick with comodo as it surmounts to about the same thing and it is free forever.:cool:
     
  16. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    Try it.
    It is cheap...20$ for lifetime license.
    Great software comes from small companies and they should be supported.
    Take DW, SB and ERP for example.
     
  17. The Red Moon

    The Red Moon Registered Member

    Joined:
    May 17, 2012
    Posts:
    4,101
    Im not questioning the price or the company but i believe free products like comodo can offer the same sort of protection.:cool:
     
  18. DBone

    DBone Registered Member

    Joined:
    Nov 24, 2010
    Posts:
    1,041
    Location:
    SoCal USA
    Well said :thumb:
     
  19. Tyrizian

    Tyrizian Registered Member

    Joined:
    Apr 26, 2012
    Posts:
    2,839
    Thank you, I appreciate that :D

    Wow, that is awesome, thanks for considering us/the communities opinions and ideas.

    Looking forward to the next version, keep up the great work :thumb:
     
  20. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    nvt,
    can you share your ideas about improvements for the next version?
     
  21. TomAZ

    TomAZ Registered Member

    Joined:
    Feb 27, 2010
    Posts:
    1,131
    Location:
    USA
    @novirusthanks

    FYI. . . I never was able to resolve my problem with the Activation Screen continuing to show up in 2.7.3 time and time again after many startups and reboots. I had to revert back to 2.7.2, which seems to be working OK.
     
  22. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    Can ERP verify the validity of file's digital signature (broken chain) or it just checks whether signature is present or not?

    Take "Windows Firewall Control" application for example (http://www.binisoft.org/wfc.php).
    It is digitally signed but when you run it, Windows popup says "Unknown Publisher".
    In File properties you can see that CA Root certificate is not trusted.

    Does ERP work this way?
    I can not test it right now cause I'm not at PC with ERP installed.
     
    Last edited: Mar 6, 2013
  23. chris1341

    chris1341 Guest

    Still getting the long start-up time during which the protection is not active and anything can launch on Win 8 x64. Between 30 seconds and a minute after the rest of the system has initialised.

    Nothing else installed while testing for now but earlier noticed this version still does not prevent execution inside SBIE sandbox although competitors do.

    Any update on start-up time and a view on whether there are any plans for ERP to work inside the sandboxie container?

    Thanks
     
  24. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    Why is this sandboxie issue so important?
    The files are isolated from the real system and can do no harm.
     
  25. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I don't care if ERP runs inside the sandbox, but when something inside the sandbox fires off a some program, yes in theory if you have sandboxie restricted it will contain it, but if you don't ERP should stop it and it doesn't. This afternoon, I tested, confirmed this, but then Malware Defender does indeed catch this. SO if MD can catch, why can't ERP?

    Pete

    PS. The reason it should be considered important is it suggest something can bypass ERP
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.