- Mar 12, 2024
- 148
the problem is that if the payload was supose to connect to someones host and download things, than cis should block it or atleast show a popup indicating the connection attempt.This sample was created to download/run a malicious payload (exe.exe) from the hardcoded URL. Six minutes after it was created, the payload was uploaded to VirusTotal.
The URL hosted the payload for less than 90 minutes. I suspect this sample + payload was a POC or an early version of the malware.
Edit.
The sample should not be detected as trusted. However, if the payload was still hosted at the time of Comodo's analysis, the sample would not be flagged as Trusted.
as cis just ignored it, than its an malware bypassing cis, right? remember that cis is a firewall too.
edit.: as it seems, the file was sent to valkyrie way before i conducted the test and sent it to val.
Last edited: