Question some questions about viruses, miners, antiviruses and encryptors

Please provide comments and solutions that are helpful to the author of this topic.

Tomoko

Level 1
Thread author
Jun 1, 2025
10
I wonder if there are subtypes of viruses like Trojan worms or something like that? and how do viruses bypass antivirus checks that don't see them as threats?
 

Bot

AI-powered Bot
Apr 21, 2016
5,174
Yes, there are various subtypes of viruses such as Trojans, worms, ransomware, adware, etc. Viruses bypass antivirus checks using methods like polymorphism (changing their code to avoid detection), exploiting software vulnerabilities, or disguising as legitimate programs.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
9,044

Tomoko

Level 1
Thread author
Jun 1, 2025
10
Hi, I have a few questions and I’d really appreciate some clarification:

1. About miners: If you keep the Task Manager open in the background for a long time, will a miner process be able to detect that it’s just running in the background and that nobody is actively checking it?

2. About antiviruses: How do antivirus databases work? How exactly do they detect malware — for example, do they compare the code to specific known malware signatures in the database?

3. About encryptors: How do they work, and what are the different types of data encryption?

I’m asking all of this to better understand how these systems work in practice. Thank you in advance!
 
Last edited:

TairikuOkami

Level 38
Verified
Top Poster
Content Creator
Well-known
May 13, 2017
2,793
1. About miners: If you keep the Task Manager open in the background for a long time, will a miner process be able to detect that it’s just running in the background and that nobody is actively checking it?
Miners generally detect Task Manager and pause till it is opened. You might have a better luck with Process Explorer or System Informer.
2. About antiviruses: How do antivirus databases work? How exactly do they detect malware — for example, do they compare the code to specific known malware signatures in the database?
Yes, but all hackers have to do, is to change one line of code and it gets a new signature, thus AVs also rely on heuristics, checking for malware like behavior.
3. About encryptors: How do they work, and what are the different types of data encryption?
It all starts with scripts via CMD, WSH, PowerShell. Ransomware gains SYSTEM privileges and then encrypts data using bitlocker or it's own encryption.


Fileless malware.png
 

Tomoko

Level 1
Thread author
Jun 1, 2025
10
Майнери зазвичай виявляють диспетчер завдань і зупиняються, доки він не буде відкрито. Можливо, вам більше пощастить з Process Explorer або System Informer.

Так, але все, що потрібно зробити хакерам, це змінити один рядок коду, і він отримає новий підпис, тому антивіруси також покладаються на евристику, перевіряючи наявність поведінки, подібної до шкідливого програмного забезпечення.

Все починається зі скриптів через CMD, WSH, PowerShell. Програма-вимагач отримує системні привілеї, а потім шифрує дані за допомогою Bitlocker або власного шифрування.

[URL-адреса розгортається="true"]https://dmcxblue.net/2021/08/30/fileless-malware/[/URL-адреса]

View attachment 288916
Thanks for all this information
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top