- May 7, 2016
- 1,400
No its system that not updated its time....We had the same idea
View attachment 286880
Surprised it's still the 24th in India
It's 26th here in Germany, 1 PM
Submission was done about 3 hours ago
No its system that not updated its time....We had the same idea
View attachment 286880
Surprised it's still the 24th in India
It's 26th here in Germany, 1 PM
Submission was done about 3 hours ago
Agree, was in Nepal just one week ago, and it's "only" 4:45h ahead of local time here (but i think they have different time zones in that small country).No its system that not updated its time....
Nepal has 1 time zone (The IANA time zone database contains one zone for Nepal in the file zone. tab, named Asia/Kathmandu.)We have 1 time zone in india but we need at least 3 time zones.. btw India is 4 hours and 30 minutes ahead of GermanyAgree, was in Nepal just one week ago, and it's "only" 4:45h ahead of local time here (but i think they have different time zones in that small country).
Yes, maybe I confused somethingNepal has 1 time zone (The IANA time zone database contains one zone for Nepal in the file zone. tab, named Asia/Kathmandu.)We have 1 time zone in india but we need at least 3 time zones.. btw India is 4 hours and 30 minutes ahead of Germany
I'm quoting harlan but this is directed to everyone.Hum ... the method of changing the hash just editing the exe, and adding for example 2 letters "xx" at the end of the code, and save, it is not the best way to do so, since it directly makes the executable unusable:
View attachment 286876
View attachment 286875
So no, the way of modifing the hash with Notepad is not valid, it should be via changing the programming code...
but everyone who uses Xcitium you guys know VirusScope detected this gdi malware so you are protectedvery unlikely you can try
By changing the hash of the sample above as so far no av was able on detection so far with a fresh hash
Tried virus scope and sent to open tip both failed with a new hash
VirusTotal - The problem is that if you just add 0 at the end in notepad, it's not 0 but an ASCI character, which breaks Exe and it won't start at all. I added a zero at the end in HxD and all the basic detections are in place with a completely new hash.Change the hahs and try again
(Open the exe in notepad and add something in the end of the file )
Captain, you've submitted through ticket option or by mail attachment??I submitted at 12 pm Indian Standard Time and K7 already detected by Trojan(0001140e1).
Thank God some one used HxD..VirusTotal - The problem is that if you just add 0 at the end in notepad, it's not 0 but an ASCI character, which breaks Exe and it won't start at all. I added a zero at the end in HxD and all the basic detections are in place with a completely new hash.
VirusTotal - The problem is that if you just add 0 at the end in notepad, it's not 0 but an ASCI character, which breaks Exe and it won't start at all. I added a zero at the end in HxD and all the basic detections are in place with a completely new hash.
I used both.Captain, you've submitted through ticket option or by mail attachment??
But, it's just a micro hash change. I'm not sure if the detections will remain if you change the code a little bit, literally add some useless if, better ask the author of the topic @XylentAntivirus , I don't want to figure out how to compile Fortran.Kaspersky, ESET and Avast! continue to detect it after your modification, which is in line with my theory: they have performed a Hexa detection on the malware.
Also K7 antivirus detected the tweak version with same trojan (0005bee901) but sadly not available on VT: VirusTotal
with a quick tweak, I've got Microsoft Defender waking up
=> Microsoft : Program:Win32/Wacapew.C!ml
Kaspersky detection was .gen, so probably They added a generic signature to detect similar attacks...Kaspersky, ESET and Avast! continue to detect it after your modification, which is in line with my theory: they have performed a Hexa detection on the malware.
So do K7, Avast,Eset...Kaspersky detection was .gen, so probably They added a generic signature to detect similar attacks...