Skip to main content

All Questions

Tagged with
0 votes
0 answers
60 views

How to harden VMware for malware analysis? [duplicate]

I’m looking for answers specific to VMware Workstation Pro 17.5.2. in 2024, not answers about other VM softwares. On Windows 11, how can I harden a VM in VMware Workstation Pro 17.5.2 so that malware ...
ingenting's user avatar
1 vote
0 answers
81 views

Streamer Virus on offline network [closed]

I have an offline network with 200 users. and routers, switches, 4 esxi servers and 1 netapp rack. After about a year, my team found out that we have a virus in the network called streamer.exe that ...
Eyalby's user avatar
  • 11
0 votes
1 answer
148 views

How are virus or exploits tested without being detected?

I was wondering how threat actors actually test their exploits without them being automatically detected and added to the library of an antivirus detection system, thereby being marked as useless and ...
birdd's user avatar
  • 41
1 vote
2 answers
182 views

How does malware work when compressed?

I have read up on compressed folders of file types such as .zip, .rar and .7zip being the malicious file itself (excluding cases such as an .exe file being disguised as a .zip file etc...), only ...
ReaLiTy-UnFatHom's user avatar
0 votes
0 answers
113 views

help in understanding hybrid analysis results? Mac

So I have a few PDFs on my computer I got online a few years ago on my Mac computer. When I ran a virus total scan on some of them I got a couple that were concerning. Here is the one that most ...
DELL_GONEEE's user avatar
1 vote
1 answer
124 views

Can I trust companies that test antimalware software? [closed]

Do they lie? I mean companies something like AV-TEST, AV-Comparatives, Virus Bulleting, ERG Effitas, etc.
Kristal's user avatar
  • 11
0 votes
1 answer
192 views

Windows Security deletes my USB virus as soon as I plug it in

I am studying ethical hacking and I work in the cybersecurity department of a company. I have been testing a hacking program but some PCs delete this executable as soon as I plug in the USB and some ...
Alex's user avatar
  • 1
0 votes
0 answers
236 views

Same miner detection by Kaspersky Anti-Virus after every boot up

I recently bought and downloaded Kaspersky. Since I downloaded it, after every reboot, it keeps detecting what seems to be a crypto miner. Every time it claims to delete it. Should I be worried ? Name:...
Youssef Mohamed's user avatar
0 votes
1 answer
385 views

No antiviruses scan graphics cards VRAM for malware?

As I know, for antiviruses the VRAM is a blindspot, so casual Windows users like me can't do much about it. They have an antivirus, which doesn't even search for malware in VRAM. What's the answer for ...
kiec00's user avatar
  • 39
0 votes
0 answers
123 views

Malware sinkhole evasion techniques

I have read into malware sink holing, as a way to disrupt botnets. There are also approaches to make this more difficult, for example using a Domain Name Generator algorithm which is what the ...
questioner's user avatar
-1 votes
3 answers
323 views

Do some malware/viruses stay on the internet basically indefinitely?

Biological viruses stay in the population essentially indefinitely. We have immune systems, but this somehow doesn't cause virus strains to completely disappear after some time, as everyone's immune ...
user56834's user avatar
1 vote
0 answers
272 views

What is the difference between malware signatures and malware artifacts?

I am trying to analyse some malware samples but I am trying to understand the differen between malware signatures and malware artifacts. As far as I understand (and from what I've understood from this ...
jefazo92's user avatar
2 votes
0 answers
758 views

Can a virus infect windows 10 bootable media?

I created a bootable windows 10 usb from my friend's computer. I used the official tool from microsoft. I was dumb enough to not check my friend's computer beforehand (turns out he had Utorrent Web ...
Jilifkate123's user avatar
0 votes
1 answer
194 views

Malware dropper uses "^" character in syntax of cmd.exe before calling mshta.exe to download file?

I found a malicious Excel file that was using an embedded HTA program as its dropper to download a powershell program from a malicious IP. The dropper was on a hidden sheet in the file. After ...
QOHEN's user avatar
  • 1
1 vote
1 answer
3k views

Mp4 virus scanners

I used to download a lot of mp4's from untrusted sources. But I discovered that they could contain malware. I would like to know if there are any methods to clean or to check video files for malware.
asterix's user avatar
  • 11

15 30 50 per page
1
2 3 4 5
11