Questions tagged [trojan]
In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent.
150
questions
0
votes
1
answer
70
views
How to handle trojan executed on my laptop? [duplicate]
Unfortunately, I have executed an .exe file on my PC. After scanning the file I understood that it is a trojan and after checking its behaviour using VirusTotal I understood that it left many files on ...
1
vote
0
answers
81
views
Why do I suddenly receive print notifications on Windows 10? [closed]
I have seen whats's in the image.
But i don't have any printer.
OS: Windows 10 22H2
0
votes
2
answers
147
views
Why spamassasin is doing dns lookup?
I have a server which have configured Amavis and Spamassasin (in default state only). I recently noticed log lines that probably indicate DNS query failure, below is an excerpt:
Nov 21 11:15:40 ...
1
vote
1
answer
109
views
Can Firejails protect against malicious links?
I would like to ask, if Firejails on Linux, protects when clicking a malicious link in the browser e.g. from downloading a keylogger or a trojan.
0
votes
1
answer
524
views
Why does the windows firewall allow apps to communicate through so many different ports and to so many different addresses?
I looked at my default windows defender firewall on Windows 10 22H2, and most of the rules allow apps to communicate through any local port to any remote address and port. I have read other questions ...
1
vote
0
answers
27
views
Removing oneetx.exe [duplicate]
So, I accidentally executed an installer downloaded from the web, Avast didn't recognize it as a virus. Nonetheless, by seeing properties I saw it was a network monitoring app, it added a process in ...
0
votes
1
answer
290
views
Do viruses survive in other drive and than re infect after resetting the PC?
Backstory:
I got infected while installing some shady software and at that time I kept Windows Defender off, (I have very much faith on my shady website) by turning its features off. But when I ...
4
votes
2
answers
632
views
How to find the process that is running PowerShell commands that appear in Windows Defender
On one of our Windows Datacenter 2016, there's an alert that a trojan is trying to install :
The following PowerShell commands are trying to execute at seemingly random hours of the day (always ...
50
votes
3
answers
14k
views
Malicious code somehow hidden with whitespace?
I recently came across a php file on a compromised website that had what appeared (in Sublime Text) to be a huge white-space gap. When I run a diff against the original source file I can clearly see ...
1
vote
2
answers
1k
views
How payloads provide backdoors when the victims are out of local network [duplicate]
I am a newbie in cyber security and trying to learn how payloads provide backdoors when the victims are out of the local network.
I know that metasploit is a good tool for making payloads, and using ...
2
votes
2
answers
2k
views
Is there malware that can run without user interaction after a download from the internet?
Is there malware that can run from a simple download from the internet autonomously without user interaction/initiation?
I know there are worms that can do that, but I assumed they needed to be opened ...
0
votes
0
answers
176
views
What is the steps to be taken when you suspect a linux malware has infected your computer?
Using Linux is a different beast entirely but sometimes malware can blend as seemingly harmless system binaries like this post
Bpfdoor
Like this post which documents a highly evasive Linux malware.
...
0
votes
1
answer
189
views
Clamscan: Infected files found in Pinta
I'm currently performing a full system scan with clamscan and found the following message:
/usr/lib/pinta/Clipper.dll: Win.Trojan.Clipper-9942182-0 FOUND
I went online and couldn't find any reference ...
1
vote
0
answers
25
views
Email supposedly from the future mentioning fairly recent password [duplicate]
Just got an email that mentioned, in very broken english, having hacked my email etc. and actually managed to list my current password of that email account. The mail was, apparently, send by that ...
2
votes
0
answers
146
views
Opened compromised Excel file - am I safe?
Long story short, got duped into opening an XLSM in Excel, with macros being enabled. Realised instantly.
Digged into the Excel structure, found the following (extremely obfuscated) payload:
=CALL(&...