McAfee Raptor BETA

Discussion in 'other anti-malware software' started by jdd58, Dec 26, 2014.

  1. treehouse786

    treehouse786 Registered Member

    Joined:
    Jun 6, 2010
    Posts:
    1,411
    Location:
    Lancashire
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
  3. treehouse786

    treehouse786 Registered Member

    Joined:
    Jun 6, 2010
    Posts:
    1,411
    Location:
    Lancashire
    it detected the first malware along with its created files. not a peep for the other 2 malwares. its mainly to show the warning popup

    better quality video can be download here http://www.filedropper.com/record20150102185820191_1
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Thanks, I wonder how it spots the malware, for some reason I have a feeling it's not really pro-active, looks like it's using signatures, perhaps from the cloud? But anyway, looks like it is indeed crap.
     
  5. 142395

    142395 Guest

    Woops, I wrongly thought PM don't use driver though surely some of its function will need driver. I googled about it and find PM uses a bit of trick to hide its driver, i.e. the driver is combined in its installer exe and will be extracted to %SYSTEMROOT%\System32\Drivers\ temporary, then it will be loaded into memory and driver file will be erased. Sorry for my misunderstanding.
    Still, as Kees illustrated, many things can be monitored w/out driver and w/out admin privilege. Considering even only metadata can be enough to distinguish malware, it's no wonder if info obtained w/out driver is enough to classify malware by their machine learning system, though I don't know if Raptor really don't load driver.
    See the link anon posted, it clearly states that it is behavior-based technology leverages machine learning, so no need to rely on any signature, while most current BB rely heavily on behavior sig (so they are not much proactive but just being generic).
    And I don't see why you say it's crap. It's just an PoC program for future adoption and automated classification by machine leaning definately have future. Considering BB is one of the weakest part of McAfee, it's good attempt for them.
     
  6. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Yes, some apps do this, but they can't fool HIPS.

    I already explained why, it's because I expected something more advanced, and besides, I'm not even into true BB's, they will always miss things, as seen in the test from treehouse786.
     
  7. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    I downloaded, installed, and tested this out on my WIN 7 x64, SP1 machine today.

    Don't know if anyone noticed or looked at their firewall logs? My WIN 7 firewall log showed blocked inbound connections for svchost.exe coming from port 443 from the following IPs: 65.55.83.125, 98.138.79.20, 157.56.74.250, and 206.190.56.191. And this was only for the hour I had Raptor installed. I just run with the std. inbound rules BTW. It also borked my DHCP incoming from broadcast address; I had a slew of those in the log. Not a trace of any of this in the Raptor log. So Raptor is not just a behavior blocker ............. Don't know what the hell it is.

    It's startup is a joke. It's via runonce registry mechanism. Well, that hung up my boot since Raptor requires admin privileges to run and I have UAC set at it's highest level. So the boot stopped with UAC prompt. It also appears to reinstall itself on each boot since the runonce entry points to where you downloaded it.

    Not ready for prime time is my verdict.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.