Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
Best Antivirus vs Windows Defender: What's the difference? (PC Security Channel)
Message
<blockquote data-quote="lockeddown" data-source="post: 1114601" data-attributes="member: 119339"><p>Hello , Friend</p><p></p><p>i will clarify more .</p><p>"The sample" is made first from the main program which is the RAT i have .</p><p>Then you can use different programs to make it look legitimate .</p><p></p><p>The file itself is the remote accesses Trojan like in left of the picture inside the sandboxie</p><p>And on the right the live PC on the Rat program you cannot see the RAT program cause i deleted some part of the picture .</p><p>There is no URL or IP of a someone else Cause it is locally made and then modified .</p><p>And You can find the RAT Program online , but you need some time testing with the other programs</p><p>That obfuscated the protecting the final execution .</p><p></p><p>The final file is really hard you will need to be a super reverse engineer to change the IP / Port .</p><p>And you can create new bypass every time , so if you think that the file gonna be recognized</p><p>You can remotely replace it .</p><p></p><p>i know what the file does i am playing with sandboxes for over 15 years .</p><p></p><p>Great conversation .<img class="smilie smilie--emoji" loading="lazy" alt="😊" title="Smiling face with smiling eyes :blush:" src="https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/1f60a.png" data-shortname=":blush:" /></p></blockquote><p></p>
[QUOTE="lockeddown, post: 1114601, member: 119339"] Hello , Friend i will clarify more . "The sample" is made first from the main program which is the RAT i have . Then you can use different programs to make it look legitimate . The file itself is the remote accesses Trojan like in left of the picture inside the sandboxie And on the right the live PC on the Rat program you cannot see the RAT program cause i deleted some part of the picture . There is no URL or IP of a someone else Cause it is locally made and then modified . And You can find the RAT Program online , but you need some time testing with the other programs That obfuscated the protecting the final execution . The final file is really hard you will need to be a super reverse engineer to change the IP / Port . And you can create new bypass every time , so if you think that the file gonna be recognized You can remotely replace it . i know what the file does i am playing with sandboxes for over 15 years . Great conversation .😊 [/QUOTE]
Insert quotes…
Verification
Post reply
Top