lockeddown
Level 1
- Jan 9, 2025
- 20
I got a 2 years old malware still undetected by comodo and windows defender .
Digital Signature is a made up nonsense .
Digital Signature is a made up nonsense .
Can't imagine a better way to say it. It's funny to see people claim antivirus have 99.8% detection rate because a testing lab published a sheet that says so. Even more, people comparing that 99.8% to a 95%, calling this last one a "useless antivirus"."I’m not quarreling with the proposition that the industry misses a lot of malware. That’s incontrovertible, when every day we’re dealing with close to 100,000 new malware samples. In fact, that sort of level of detection that NSS is talking about — 50 to 60 percent right out of the gate — sounds realistic to me."
I got a 2 years old malware still undetected by comodo and windows defender .
Digital Signature is a made up nonsense .
View attachment 287062
Cause they are limited by design .Most of the top AVs consider this sample as unharmful
The specific sample was not submitted - it was created by me using 15 years old RAT and other software's .This happens when the rare sample is already inactive when submitted for the first time to analysis.
Now that i said that this is a RAT please elaborate how there are no malicious actions .So most AVs cannot detect malicious actions because there are none.
It was uploaded to a none sharing site .Eset and a few other AVs could see that sample when it was active
If history repeats itself, perhaps, maybe MS will charge for Defender - IF, that day arose how many Defender users would continue to use it? I suspect most would jump ship & use another free AV solution ?Things have come a long way since XP days with no firewall and terrible security. Microsoft receives a lot of hate and they deserve it but implementing WD for free is one of their better decisions. Compare AV from 2001 to now and it's day and night how far protection has improved. AV was never meant to stop targeted attacks using zero day's, but it's getting better over the last 20 years and now campaigns last for hours not days or months (rare these days) before being uncovered.
The problem with WD is that once Microsoft has crushed all of the competition will they start charging for basic WD protection or new features. They have a history of abusing their power.
You added some new information about the sample:The specific sample was not submitted - it was created by me using 15 years old RAT and other software's .
There is no reason to submit it cause the same file can be altered .You added some new information about the sample:
- It was not submitted for analysis or run against AVs (except Comodo)
The file only opens without any startup or other things .Did you try to analyze what it tried to do after the execution?
The file is used for malicious actions .Without more information, the most probable explanation is that currently, that sample does not do truly malicious actions.
The file is used for malicious actions .
i will clarify more .It is the sample modified by you. Does anybody use it for malicious actions?
The file itself is the remote accesses Trojan like in left of the picture inside the sandboxieMany samples used in the wild can often be unharmful after some time. It is a common behavior.
For example, it could be identified as malicious because of downloading a known malicious payload from a known malicious URL and then establishing the connection with the C2 server. Currently, the URL and IP of the C2 server have been forgotten and dead for 15 years, so the sample cannot do anything.
The final file is really hard you will need to be a super reverse engineer to change the IP / Port .It is possible to make some of such samples "alive" by changing the hardcoded URL and IP (controlled by a malicious actor) and putting a new malicious payload there. But then, there would be chances that the sample could be detected by other AVs.
i know what the file does i am playing with sandboxes for over 15 years .Anyway, If you need more information about what the sample really does, you can upload the sample to online sandboxes or submit it for analysis as a false-negative.
on that specific use case there is no need in vpn its locally like 192.168.1.1It is also not recommended for malware analysis, except if used in a Virtual Machine with a VPN.
Some malware can also infect the computers in the local network or even some computers of nearby Wi-Fi networks.
proof that windows defender did nothingDid you submit the sample to Any.Run?
proof that windows defender did nothing
Comodo too i will record the proof if you want
Imagine reverse engineer getting the same file month after month with different protections
He will quite the job haha
The test that i did was on the local machine like file transfer , deletion , send commands so on and so forth .It is not necessary. Your proof may be interpreted that the FUD sample does nothing, except when you show malicious changes, data leaks, etc.
Now you are talking about a locked down software with advanced configuration and an expert IT man that sitting beyond you .Some custom and non-prevalent FUDs can bypass most AVs. Anyway, most run-time FUDs can be detected by a combination of Machine (Deep) Learning, cloud sandboxes, code emulation, etc. The analysts may bother to reverse engineer the crypter software when it becomes sufficiently prevalent.
The test that i did was on the local machine like file transfer , deletion , send commands so on and so forth .
I feel like you want something special that i cannot provide sorry![]()
No you are talking about locked own software with advanced configuration and an expert IT man that sitting beyond you .
I am talking about the regular home user and you have like 1billions of those or more