Jump to content

Ali Akbar

Members
  • Posts

    35
  • Joined

Posts posted by Ali Akbar

  1. 16 hours ago, safety said:

    This file (!#_RESTORE_FILES_#!.INF) can not be deleted by the ESET antivirus, because it was detected at the time of scanning the system in malwarebytes, so mbam blocked it.

     Hi @safety

    Thanks for the reply.Does it mean if we disable the Malwarebyte Protection and run ESET scan again will able to delete the  !#_RESTORE_FILES_#!.INF ?

  2. Hi Marcos,

     

    Thanks for the reply.The server has not infected by the Filecoder.BTCware,but ESET has detected it but unable to clean ....

    ESET has detected the file but unable to clean it.In other side,Malwarebyte has detected a malware name RiskWare.BitCoinMiner.
    Isn’t Win32/Filecoder.BTCWare (detected by ESET) and RiskWare.BitCoinMiner (detected by Malwarebytes) are same malware ?

  3. Hi,

    One of our client’s server endpoint has detected Win32/Filecoder.BTCWare but unable to delete/clean it. Their server currently running two endpoint protection,ESET File Security and Malwarebytes.ESET has detected the file but unable to clean it.In other side,Malwarebyte has detected a malware name RiskWare.BitCoinMiner.
    Isn’t Win32/Filecoder.BTCWare (detected by ESET) and RiskWare.BitCoinMiner (detected by Malwarebytes) are same malware ?

    <RECORD>
          <COLUMN NAME="Time">23/01/2018 8:32:57 AM</COLUMN>
          <COLUMN NAME="Scanner">Real-time file system protection</COLUMN>
          <COLUMN NAME="Object type">file</COLUMN>
          <COLUMN NAME="Object">C:\DOCUMENTS AND SETTINGS\PUBLIC\LIBRARIES\!#_RESTORE_FILES_#!.INF</COLUMN>
          <COLUMN NAME="Threat">Win32/Filecoder.BTCWare trojan</COLUMN>
          <COLUMN NAME="Action">unable to clean</COLUMN>
          <COLUMN NAME="User">NT AUTHORITY\SYSTEM</COLUMN>
          <COLUMN NAME="Information">Event occurred during an attempt to access the file by the application: C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe (F03B45E99A692E9492FDBBA0CF2D0C8440B26E79).</COLUMN>
          <COLUMN NAME="Hash">85B3E115935D14074AD9792E9C15CBD06C0351C5</COLUMN>
          <COLUMN NAME="First seen here">10/06/2017 4:56:51 AM</COLUMN>
        </RECORD>
        <RECORD>
          <COLUMN NAME="Time">23/01/2018 8:32:57 AM</COLUMN>
          <COLUMN NAME="Scanner">Real-time file system protection</COLUMN>
          <COLUMN NAME="Object type">file</COLUMN>
          <COLUMN NAME="Object">C:\DOCUMENTS AND SETTINGS\PUBLIC\DOWNLOADS\!#_RESTORE_FILES_#!.INF</COLUMN>
          <COLUMN NAME="Threat">Win32/Filecoder.BTCWare trojan</COLUMN>
          <COLUMN NAME="Action">unable to clean</COLUMN>
          <COLUMN NAME="User">NT AUTHORITY\SYSTEM</COLUMN>
          <COLUMN NAME="Information">Event occurred during an attempt to access the file by the application: C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe (F03B45E99A692E9492FDBBA0CF2D0C8440B26E79).</COLUMN>
          <COLUMN NAME="Hash">85B3E115935D14074AD9792E9C15CBD06C0351C5</COLUMN>
          <COLUMN NAME="First seen here">10/06/2017 4:56:51 AM</COLUMN>
        </RECORD>

     

     

     

    logs.txt

  4. Hi,

    Currently we are doing ESET POC for one of our client. The ERA server is connected to proxy for access to the internet. After configuring the proxy details in  Servers Setting in ESET Remote Administrator, the ESET Repository able to work and create the all in one installer. We also had set the HTTP Proxy Policy for both product and Agent to the endpoint (ERA IP). Currently the endpoint is not receiving the update from the ERA Server. When we check in Apache HTTP Proxy folder for Cache, it was empty, didn’t store any cache for ESET Update file. My assumption here is the apache is listening to its own IP where by right its must  be configured to client’s own proxy to connect to internet and download the update file. Is there any work around for this problem 

     

    ERA Version 6.5
    Endpoint : Version 6.6
    Windows Server 2012

     

×
×
  • Create New...