Jump to content

itman

Most Valued Members
  • Content Count

    8,270
  • Joined

  • Last visited

  • Days Won

    201

itman last won the day on June 12

itman had the most liked content!

About itman

  • Rank
    Expert

Profile Information

  • Gender
    Male
  • Location
    USA

Recent Profile Visitors

16,398 profile views
  1. I am wondering if the issue here is the same Microsoft account is being used for both devices. MyEset might be using that somehow internally to ID devices. You might have just figured out a way to bypass Eset's license validation processing.🤭
  2. You might want to refer to this article: Also of note: https://www.sophos.com/en-us/press-office/press-releases/2021/01/sophos-identifies-source-of-mrbminer-attacks-targeting-database-servers.aspx -EDIT- In regards to the above "similar techniques" referenced is all employed some form of brute force attack element against the server and/or exploiting of system vulnerabilities. Since it appears sqlserver.exe in your situation is directly initiating the Trojan download attempt, I assume some type of code injection is being performed against it. Again, this assumes that
  3. Based on the posted my Eset screen shot, it appears you purchased one Eset NOD32 license for two PCs; not two 1 PC Eset licenses. If you bought two 1 PC Eset licenses, the key for each license would be different.
  4. What about sqlbase.exe since this is the malicious parent process? Does that show in SysInspector? BTW - I believe a malicious sqlbase engine was installed. Also it appears you found the malicious versions sqlbase.exe and sqlconn.exe since they are sitting on your desktop. Is the issue these keep reappearing on the infected devices? Also submit sqlservr.exe on one of these devices with issues to VirusTotal for a scan.
  5. For registry subordinate keys under "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\", you need to code the following, "HKEY_LOCAL_MACHINE\SYSTEM\*\". For example: HKEY_LOCAL_MACHINE\SYSTEM\*\Services\USBSTOR\Start
  6. For starters on an infected device check if the following exists: %WINDIR%\\FONTS\\SQLCONN.EXE
  7. Make sure the settings highlighted in the below screen shot are enabled:
  8. I assume the device names with Eset installed are Suzanne, Angel, and Shuriken-PC? If so, delete all other devices shown other than these three.
  9. Avast paid products include a sandbox feature. Eset consumer products do not.
  10. You can set up the Comodo firewall so that everything runs in an isolated environment: https://www.youtube.com/watch?v=vktNQCwB2UY . You then just set up exclusions for your trusted apps. Video author states on the various security forums that no 0-day malware has been able to bypass her custom Comodo setup.
  11. As far as desktop notifications go, refer to the following per Eset on-line help: I have mine set to "Diagnostic" and have no issue with Eset HIPS rule desktop notifications appearing.
  12. Eset's System Cleaner feature primary function is to reset Windows settings back to default values. The "Cleaner" reference in my opinion is misleading. Also as the Help for this feature states, it should not be run w/o Eset tech support instruction to do so. System Cleaner's primary purpose is to remove system modifications made by malware. However, many also perform custom modifications to Windows system settings and those will be removed when System Cleaner is run.
  13. Eset Push Notifications option uses process ekrn.exe, TCP protocol, and remote port 8883. Verify that outbound network traffic for this is not being blocked by whatever firewall you are using.
  14. There is no sandboxing used since Eset doesn't have one in contrast to its major competitors. At least, a stand alone sandbox employing virtualization. Eset employs an internal sandbox in regards to the hueristic scanning done by its real-time protection.
×
×
  • Create New...