Skip to main content

Questions tagged [malware]

Malware is any software application which subverts the will of the legitimate owner of a computer, by means of force or subterfuge, with or without personal or monetary gain on the part of the creator.

0 votes
0 answers
112 views

Very frequent calls to same Windows API function by malware

Here I have a malware sample that calls RegQueryValueEx quite frequently, without any time interruption. And as we can see, the result is quite often "BUFFER OVERFLOW". In another topic I ...
Questions123's user avatar
0 votes
1 answer
233 views

Can double-clicking an infected .xlsx file infect me if it crashed?

I downloaded an Excel (.xlsx) file from the internet. Then I tried to open it by double-clicking on it. But it suddenly crashed. Could this mean it could've contained a virus or malware?
Elon Musk's user avatar
0 votes
3 answers
126 views

Network knowledge in malware analysis

I asked an experienced person about the needs of malware analysis. He told me: "Learn x86, C/C++, Win32 API, Windows internals, PE file structure basics... Then when you are comfortable with ...
Moha Mohai's user avatar
0 votes
1 answer
185 views

Is an antivirus needed for linux home usage when there is exchange of files with other OS e.g. Windows?

I was under the impression that an antivirus for Linux makes sense only for installing in business computers. Checking Norton/BitDefender/Karpesky I don't see any Linux option for the first or any non ...
Jim's user avatar
  • 183
0 votes
1 answer
148 views

How are virus or exploits tested without being detected?

I was wondering how threat actors actually test their exploits without them being automatically detected and added to the library of an antivirus detection system, thereby being marked as useless and ...
birdd's user avatar
  • 41
0 votes
0 answers
82 views

What types of attacks can MFA using an hardware authenticator prevent?

I recently looked into the topic of MFA in combination with some hardware authenticator (USB keys like Nitrokey/Yubico) to potentially improve the overall security of my digital daily activities (web ...
Stephan's user avatar
1 vote
2 answers
182 views

How does malware work when compressed?

I have read up on compressed folders of file types such as .zip, .rar and .7zip being the malicious file itself (excluding cases such as an .exe file being disguised as a .zip file etc...), only ...
ReaLiTy-UnFatHom's user avatar
0 votes
1 answer
219 views

ScyllaHide DLL Injection

When I try to perform a DLL injection with ScyllaHide in x32/x64 dbg, then it crashes for some reason, is this a bug? Both with stealthy injection as with normal injection, the program crashes when I ...
Moooz's user avatar
  • 45
0 votes
0 answers
25 views

microsoft bitlocker copy data in background [duplicate]

I use microsoft bitlocker encryption all my disks. Some day, maybe I click on a phishing email and my computer be hacked. Hacker sends my data to his server. Is the data encrypted or plaintext in his ...
bigdata's user avatar
1 vote
0 answers
115 views

Suspicious new folders with chaotic jpg,sql,doc,txt and doc files

I found several new folders, each containing 10 small files with random content ( a chaotic picture, an rtf of random letters, a corrupted doc file etc...), all the files were created at the same time,...
OMGsh's user avatar
  • 111
1 vote
2 answers
378 views

How to determine which Chrome extension is re-directing me to ad sites

Twice now, seemingly randomly, I've been redirected to an ad site. I believe it has occurred both times when I have a new tab open, type what I'm searching for (Google is my default search engine), ...
johnfernow's user avatar
0 votes
1 answer
149 views

How many parts of an average laptop can be compromised? and how to confirm they are not?

The majority of virus/malware is stored and persists on the hard drive, Therefore by formatting the hard drive or re-installing the operating system, the virus is removed. However, the average laptop ...
Marshall's user avatar
2 votes
1 answer
113 views

How to detect a malware which is fragmented across multiple packets

How can we detect a malware which is fragmented across many packets , do we have to do some prefix /suffix matching kind of approach? Does tools like snort,Suricata support this ?
Chits's user avatar
  • 105
1 vote
1 answer
153 views

Can malware detect memory dumping?

Morning, I recently had need to check for malware on my PC by dumping the memory and searching for unwanted processes which could be malware, my question it's, is it possibile for malware to detect ...
Hopkins's user avatar
  • 13
1 vote
1 answer
204 views

Does Python in Excel have the same Security issues as VBS in Excel?

Microsoft Excel supports Python scripts (source). VBScript Macros within Excel are known to be a security risk (source). If I read this emotet article right, then VBScript macros allow arbitrary code ...
Martin Thoma's user avatar
  • 3,932

15 30 50 per page