I haven't run this executable yet, just looking thru it on a VM. Link: VirusTotal
What bothers me is that Kaspersky and Malwarebytes return "non-malware", but many others say it's a crack (it is tbh). But what REALLY bothers me is that if you look at the behavior, it has hit 2 high-severity (red)
YARA rules. Interestingly enough, the contacted IPs don't appear to be malicious based on VT's findings.
But why would a crack do those things listed in the YARA rules? By the way, when I analyze something with Kaspersky or HitmanPro, do they only apply static analysis, or do they analyse the sample dynamically too?
I'm in the process of learning how to tell if something is malware or not based on VT, WireShark, Process Explorer, etc
What bothers me is that Kaspersky and Malwarebytes return "non-malware", but many others say it's a crack (it is tbh). But what REALLY bothers me is that if you look at the behavior, it has hit 2 high-severity (red)
YARA rules. Interestingly enough, the contacted IPs don't appear to be malicious based on VT's findings.
But why would a crack do those things listed in the YARA rules? By the way, when I analyze something with Kaspersky or HitmanPro, do they only apply static analysis, or do they analyse the sample dynamically too?
I'm in the process of learning how to tell if something is malware or not based on VT, WireShark, Process Explorer, etc



