Evjl's Rain
Level 47
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
- Apr 18, 2016
- 3,684
can I disable the realtime protection but keep the behavior blocker on? otherwise I can't test itCan you test Quick Heal?
sorry, I don't know exactly because I executed 3-5 samples at a time so it's not easy to find out which one encrypted the files. I have to watch the video again, pause, find the sample, upload to VT, not easy actuallyThanks for test
do you know the name of those ransomwares which DrWeb faild against them?
one of them was Cerber, i don't know why its faild against cerber ! i will ask , usually when DrWeb add a ransomware or i don't know any kind of malwares to its database, also know that malware's behavioral algoritm...
i'll track this question down with supports
Dont know?can I disable the realtime protection but keep the behavior blocker on? otherwise I can't test it
and lets don't forgot that in real world i'm using DrWeb data loss prevention too ( its something like Webroot rollback but its diffrenc is DrWeb rollback eny changes on files in less than 1 sec.. )but don't worry, it's very rare that you catch 0-day ransomwares. Usually you are protected by signatures
i'll mention her here,Dont know?
cruelsister tested it & find it good. She may know if BB can be tested by disabling realtime protection. Hope she give the info here.
Would love to see this one, tooCan you test Quick Heal?
@Mr.Pr I've tracked down (might have missed some):Thanks for test
do you know the name of those ransomwares which DrWeb faild against them?
one of them was Cerber, i don't know why its faild against cerber ! i will ask , usually when DrWeb add a ransomware or i don't know any kind of malwares to its database, also know that malware's behavioral algoritm...
i'll track this question down with supports
Not in the HUB Have seen a few ransomwares being missed by Dr. Web signatures after days, with major detections, too (in vid reviews). But actually you're rightbut don't worry, it's very rare that you catch 0-day ransomwares. Usually you are protected by signatures
thanks BenI've tracked down (might have missed some):
Cerber, which surprised me
Locky (no secret, Dr. Web failed every time I tested it)
Spora
.Lock (seems to be a brazilian one)
JackPot
Ishtar
With pleasurethanks Ben
anybody knows these ransomwares are able to bypass SD ? because if they can then i cannot test them in my host machine ( i'm using SD on my host machine )
by the way i need to execute them, find their .exe files which can infect a system that already protected by DrWeb, then sent those samples for DrWeb and ask them what is going on with their BB..
so parham is kaheymal Dr.Web and he tell sherover do't worrythanks Ben
anybody knows these ransomwares are able to bypass SD ? because if they can then i cannot test them in my host machine ( i'm using SD on my host machine )
by the way i need to execute them, find their .exe files which can infect a system that already protected by DrWeb, then sent those samples for DrWeb and ask them what is going on with their BB..
yes Dr.Web really weak against Locky ransomware and win lock malware...I confirmedWould love to see this one, too
Thank you @Evjl's Rain for the comprehensive test
Dr. Web has some long way to go in terms of ransomware...
@Mr.Pr I've tracked down (might have missed some):
Cerber, which surprised me
Locky (no secret, Dr. Web failed every time I tested it)
Spora
.Lock (seems to be a brazilian one)
JackPot
Ishtar
Not in the HUB Have seen a few ransomwares being missed by Dr. Web signatures after days, with major detections, too (in vid reviews). But actually you're right
Good news that Dr. Web works flawlessly alongside VoodooShield
You don't need to worry about malware bypassing Shadow Defender, the chances of it happening are very slim. However, it is not safe to use Shadow Defender for malware testing on your main system... Problems such as identity theft can still occur, and if you have VPN running then malware will still be able to intercept it's functioning and disable it remotely. For example, the changes are reverted by Shadow Defender, however programs can still manipulate the memory of other programs and prevent things from functioning properly - since it can do this, it can still perform actions such as steal information (data theft) from other software and access other information related to browser history, etc.anybody knows these ransomwares are able to bypass SD ? because if they can then i cannot test them in my host machine ( i'm using SD on my host machine )
Norton Sonar works based on monitoring the execution flow of the program being executed and monitored - sadly they just are unable to create an identification system for CTB-Locker; it's more difficult than you think and a lot of testing has to be done when developing these sort of behavioral components since the last thing you want is to end up a bunch of false positive detection's flagging up on your customers systems. A better alternate would be for them to implement a proper anti-ransomware component which: identifies suspicious file modification attempts, and blocks off the Master Boot Record from modification via a device driver to prevent ransomware samples like Petya or general bootkits.for example i can say Norton still cannot block ctb-locker ( not that the old one ) with its SONAR ! why is that? no one knows
this time i will not let it go till i got an answer