Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Malware Analysis
Self-Made Fortran Malware Analysis
Message
<blockquote data-quote="SeriousHoax" data-source="post: 1112723" data-attributes="member: 78686"><p>I'm quoting harlan but this is directed to everyone. </p><p>Adding values like, "xx" at the end of the code is obviously going to break the file. </p><p>The easiest and safe way to do for an average user who are not sure would be to use a program like this:</p><p>[URL unfurl="true"]https://github.com/ewwink/MD5-Hash-Changer[/URL]</p><p>It simply adds an empty string at the end of a file. You can verify by opening the file in a hex editor.</p><p></p><p>Regarding Rising, it doesn't use Kaspersky engine, I think. What it does is simply copies Virustotal detection of Kaspersky and a couple of other products. Rising is not alone in this. Some other products also do this. Sophos also add things from Virustotal and most of the time initially they are detected as, PUP by their engine. Those are cloud based detection based on Virustotal which they try to hide.</p><p>Microsoft Defender has mechanism to search for malware IOCs on Twitter/X and these are detected as, "xxxxx....Casdet", at the end of the detection name. Here Casdet means, "Casandra Detection". But they don't just blindly add detection, they have some failsafe methods for that. But it's still a cheat code like method.</p></blockquote><p></p>
[QUOTE="SeriousHoax, post: 1112723, member: 78686"] I'm quoting harlan but this is directed to everyone. Adding values like, "xx" at the end of the code is obviously going to break the file. The easiest and safe way to do for an average user who are not sure would be to use a program like this: [URL unfurl="true"]https://github.com/ewwink/MD5-Hash-Changer[/URL] It simply adds an empty string at the end of a file. You can verify by opening the file in a hex editor. Regarding Rising, it doesn't use Kaspersky engine, I think. What it does is simply copies Virustotal detection of Kaspersky and a couple of other products. Rising is not alone in this. Some other products also do this. Sophos also add things from Virustotal and most of the time initially they are detected as, PUP by their engine. Those are cloud based detection based on Virustotal which they try to hide. Microsoft Defender has mechanism to search for malware IOCs on Twitter/X and these are detected as, "xxxxx....Casdet", at the end of the detection name. Here Casdet means, "Casandra Detection". But they don't just blindly add detection, they have some failsafe methods for that. But it's still a cheat code like method. [/QUOTE]
Insert quotes…
Verification
Post reply
Top