- Mar 12, 2024
- 182
nop.Any IoC, SHA of the sample?
nop.Any IoC, SHA of the sample?
Thanks, the webpage looks like the upload page I tried a day or 2 ago, but uploaded file just seemed to spin in a loop... Just tried again with 3.5 mb file and I got: 500 oops! something went wrong. we are fixing it please come back in a while... BUT just tried a URL and it seems to be working for that...
This is very odd to me. You want to do security, you discuss certain things publicly, but you hide some basic data to make users more secure.nop.
WikiLeaks vault 7 shown that comodo wasn't an easy target for CIA as it blocked even windows (they weren't really able to get any payload to execute on comodo 5.0)Adrian Ścibor
@Loyisa (MT member) who made the POC is in contact with Comodo. She also helped to identify the sandbox escape exploit:
![]()
Comodo 6.X Gaping Hole of DOOM
Comodo, as you may know, is a colossal pain in the posterior. It literally catches everything until you tell it not to, including standard windows services (say what?!?).
...at least, that's what happens on Comodo 5.X. In 6.X, Comodo apparently decided that catching things that were part of windows was a Bad Thing(tm). Their "fix" was... kinda lame
Anything running as SYSTEM is automatically legit under 6.X. ANYTHING. Let that sink in. Got a kernal level exploit? Good, because you can drop the kitchen sink and the contents of your garage and as long as you continue to run as SYSTEM you are golden. Yeah.
Needless to say, Comodo 6.X doesn't catch nearly as much stuff. Comodo's user base, paranoid bastards that they are, has apparently caught wind of this and lots of them haven't upgraded to 6.X. Kind of a shame, cuz this is a hole you could drive a very large wheeled freight carrying vehicle through. However, if you're lucky enough to be going against a target running 6.X, have fun!
I created a new user sign-in and activated ok, then I sent a sha256 for a file that is "suspicious" and using firefox I get: "secure site not available -- you've enabled HTTPS...and a HTTPS version of verdict.valkyrie.comodo.com is not available" -- I find this "unsettling" or WTF! (this has happened at least twice today) WTFx2 -- is this "acceptable"? am I the only seeing this?I tried it a few minutes ago without any issues. But, it may be overloaded sometimes.
I created a new user sign-in and activated ok, ...
well ok but I'm not seeing anything to tell me the file is being analyzed, and you saw my post about uploading sha256 and getting no HTTPS... weird imo.The website quickly displays the result if the uploaded file is already known.
The full analysis may take some hours if the uploaded file is unknown.
I tested the Valkyrie website in different scenarios. I tried it without a VPN, disabling the ad blocker and secure DNS. Valkyrie, it appears, is experiencing some technical issues. Sometimes it gives a verdict, sometimes it shows an error, and sometimes the analysis just loops.well ok but I'm not seeing anything to tell me the file is being analyzed, and you saw my post about uploading sha256 and getting no HTTPS... weird imo.
ok thanks, yes I have seen all of thoseI tested the Valkyrie website in different scenarios. I tried it without a VPN, disabling the ad blocker and secure DNS. Valkyrie, it appears, is experiencing some technical issues. Sometimes it gives a verdict, sometimes it shows an error, and sometimes the analysis just loops.
... glad there are other sandbox analyzer sites that work
and you saw my post about uploading sha256 and getting no HTTPS... weird imo.
Xcitium human analysis sometimes false flags stuff as malware that isn't and objections at least in my case didn't helpThe previous Valkyrie website, featuring a red design, offered speedy performance on par with similar services. This new Valkyrie website, it appears, is having a few technical glitches.
yes, that's what I saw, THANKS!! good to know.Currently, the website has a bug. After inserting the MD5 or SHA256 hash, it shows an error:
View attachment 286732
There are no issues with SHA1 hashes.
I recall (vaguely) a few years back discussions about heavily editing (deleting) the trusted vendors' list. I never did that, but I think some folks did or do...Comodo is very powerful but since it's increased it's trust not just towards windows binaries (possibly after comodo 5.0) and in recent times to having a trusted vender list Wich means that stuff trusted can technically turn malicious
no man. you get it wrongly. i received aproval from who developed the poc to show on my videos and he/she asked to not share it, so i respect it. get the point? as andy said, try to contact he/she about the sample for v4 (the one ive being testing and showing cis and xcitium being obliterated)This is very odd to me. You want to do security, you discuss certain things publicly, but you hide some basic data to make users more secure.
well, i didnt see the topic you mentioned but i agree with you. i usualy come here to bring some tests with cis showing poc evading containment, ransonware being trusted, etc., but i still have cis as main protection. every software has flaws. i guess that the problem with cis is the delay comodo has to "do something" when neededHere is a post on the Wilders Security forum related to this thread:
https://www.wilderssecurity.com/thr...final-infos-thread.453843/page-3#post-3218351
I must partially agree with @cruelsister. The readers might wrongly understand the interesting POCs and discussions here because of very different viewpoints. I saw a similar situation when reading interesting threads about bypassing Microsoft Defender and other AVs. Whenever the bypass was presented, some people were convinced that AV was not enough, and willing to change it to another one. Such a reaction is natural but mainly irrational. Let's not be fooled by emotions.
The POCs and bypasses have a much smaller impact on security than hundreds of new malware variants, that bypass AVs each day due to the limitations of Machine Learning.
Currently, the Malware-As-A-Service is sufficiently prevalent and malware is often prepared to bypass the protection of most AVs.
It is better to see an AV like a human immune system. It is not intended to protect any cell in the body but to prevent infecting many cells.
- People who use Comodo should not be surprised that it can be bypassed. Auto-containment is not a perfect solution.
- Users should not think that other AVs can protect better because someone presented some of Comodo's bypasses or POCs.