Europeans targeted with new Tor-using backdoor and infostealers

Discussion in 'malware problems & news' started by ronjor, Jan 29, 2025.

  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    177,020
    Location:
    Texas
  2. moredhelfinland

    moredhelfinland Registered Member

    Joined:
    Mar 31, 2009
    Posts:
    410
    Location:
    Finland
    One of my malware laptops, maybe the one that i downloaded from Malwarebazaar, which was not detected.
    G Data: No signature detection, but after running the sample, G Data File Cloud: Verdict:Malware, then it rolled back all the modifications made. Good work by G Data BEAST, sort of. But while it's does cloud lookup and verdict, it does not prevent OUTSIDE connection. So the game is lost, too late.
    Emsisoft: Signature fail, no BB detections
    OS Armor: Suspicious Process Blocked
    Malwarebytes: No detection at all
    Oh well...
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    To clarify, are you talking about the infostealers that were mentioned in the article? But thanks for the info, I assume you test this stuff in a virtual machine?
     
  4. moredhelfinland

    moredhelfinland Registered Member

    Joined:
    Mar 31, 2009
    Posts:
    410
    Location:
    Finland
    @Rasheed187
    No WM, pure windows 11 installed on lousy dual core laptop connected to prepaid mobile network. :)
    Many malwares are "VM aware", so they do not work, that is why, when testing, i prefer real env to how the malware performs.
    I'm also using Netlimiter "Blocker" as a firewall, because it can stop/pause, uses it's own kernel mode fw driver, so when malware try to disable or add its own outgoing rules to windows own firewall, they are useless, because king of the hill is Netlimiter Blocker.
     
  5. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    OK I see, totally forgot about malware that can evade VM's. And yes, I saw your comments about NetLimiter in the other thread, but I do believe that tools like TinyWall should perform the same, you might want to check this out.
     
  6. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,500
    This thread shows why I ONLY conduct internet workspace using VM's. My host stays clean and a two second snapshot restore keeps things running clean and smooth. Nothing is perfect but even my VM's have counter measures running inside. 100% Linux only. Still these articles are a great read.
     
  7. moredhelfinland

    moredhelfinland Registered Member

    Joined:
    Mar 31, 2009
    Posts:
    410
    Location:
    Finland
    Now testing Emsisoft Anti-Malware Home. It's using BD sigs, like some other AV vendors does.
    While testin it against some fresh samples, especially signed variants of DCrat and Remcos Rat. No Bitdefender signature detection.
    G Data failed miserably(G Data Deepray and BEAST) and Sophos Home Premium(via hmpa.alert component) stopped the "final stage", but failed to remove actual malware, every reboot it does "attack intercepted".
    Emsisoft does not detect it by its sigs, but prevented the first stage(infostealer sending sh*t) , "Hidden Downloader". Quite nice for Emsisoft BB(for this case).
    And we all know, that if your favorite AV does not detect malware sample in VT results, it does no mean that the malware slips thru.
    In this case, the winner is:
    1) Emsisoft, first stage block, no information sent to an attacker
    2) Sophos Home, information sent(autorun .js script added for "persistence")
    3) G Data (not much to say, autorun .js added, connectin outside without any notice)
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.