![]() If you'd like the Malwarebytes Research team to analyze it to determine whether or not it's a valid threat, you may submit it by following the instructions in this topic and provide the file and requested info in a new topic in that area by clicking here, however I honestly don't believe that the file is actually malicious based on the info in the VirusTotal report you posted so the file is most likely safe, at least in my opinion (though again, I am no expert on the subject so feel free to submit the file if you want to be sure). Even the "BehavesLike" detection mentions "Obfus" which is short for "obfuscated" which again is most likely just a reference to the fact that the file is compressed/compiled using an encrypted packer, and obviously it's a packer they've identified being used by some actual ransomware, or at least the packer being used looks like one used by actual ransomware they've found before). If you look at the 3 AVs that flagged it, each of them mentions something about the packer used for compressing/compiling the file itself, not necessarily its actual content or purpose (Suspicious.Gen just means that it was a generic heuristic detection made because the structure of the file shared some characteristic(s) with actual known malware in this case, malware packed using this particular or a similar packer/encryptor). While I'm not a threat researcher, it appears to me based on the vendor names/threat names being chosen by those that detected it and the fact that only 3 out of the 67 engines detected it, that it is a false positive, not a real threat, and is only being detected by heuristics which are targeting it because of the packer used by the program's developer to compress his file/application (packers are used by both legitimate developers as well as malware authors, however the reason malware authors will use them is to attempt to escape detection by obfuscating their code to try and prevent extracting/analyzing it by threat researchers through encryption and compression of their files). Before submitting your reply, be sure to enable "Notify me of replies" like so:Ĭlick "Reveal Hidden Contents" below for details on how to attach a file: Please attach the file in your next reply. You will be presented with a page stating, " Welcome to the Malwarebytes Support Tool!"Ī progress bar will appear and the program will proceed to gather troubleshooting information from your computerĪ file named mbst-grab-results.zip will be saved to your Desktop Supports checking the 2-factor authentication status of user accounts at Control Panel > User & Group > Users. Added support for RAID arrays with 16 and 20 hard drives when creating RAID groups. Place a checkmark next to Accept License Agreement and click Next Users can now enable the quota setting for shared folders that are located on volumes with data deduplication enabled. You may be prompted by User Account Control (UAC) to allow changes to be made to your computer. Once the file is downloaded, open your Downloads folder/location of the downloaded fileĭouble-click mb-support-X.X.X.XXXX.exe to run the program NOTE: The tools and the information obtained is safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system. ![]() You can also easily weed the bad duplicates out, thanks to the Power Marker.If you haven’t already done so, please run the Malwarebytes Support Tool and then attach the logs in your next reply: Not only can you delete duplicates files dupeGuru finds, but you can also move or copy them elsewhere.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |