Jump to content

Decker2124

Members
  • Posts

    46
  • Joined

  • Last visited

Kudos

  1. Upvote
    Decker2124 gave kudos to itman in Chihuahua Stealer malware   
    Downloading a sample of the stealer from a malware feed, Eset detects it;

  2. Upvote
    Decker2124 gave kudos to Marcos in So I get these alerts...   
    I was informed that incidents may sometimes be created without detections. You can delete them. If this happens more frequently, please raise a support ticket as it would require further investigation by ESET HQ.
  3. Upvote
    Decker2124 gave kudos to Marcos in CO-Management   
    Unfortunately, co-management is currently unavailable. For more information, please read https://help.eset.com/protect_hub/customer/en-US/co-management.html
    Currently, co-management is unavailable because the migration and onboarding of resellers to ESET PROTECT Hub are still in progress. The feature will become accessible once resellers have successfully migrated to ESET PROTECT Hub.
  4. Upvote
    Decker2124 gave kudos to Mythictyrant in Akira Ransomware Help Required   
    Akiradecryptor.org are Complete scammers. Paid them and they completely went silent. Once paid they stopped responding. Do not trust! Was really relying on them. Hopefully they respond, but once they were paid they have not said a word for 5 days. We went back and forth. They even made a move that instilled added trust. But once paid they have gone dark. Don’t use akiradecryptor.org I guarantee you will regret it.
  5. Upvote
    Decker2124 gave kudos to Illuzio in Akira Ransomware Help Required   
    We tried akiradecryptor.org. We paid them, but after payment never received any replies to our apps anymore. So seems like a scam.
  6. Upvote
    Decker2124 gave kudos to bblair in User account files read by a suspicious process   
    So likely worth investigating further. Thanks for the 2nd opinion.
  7. Upvote
    Decker2124 gave kudos to Marcos in Ransomware Remediation   
    It has not been 100% confirmed yet so please take the above post with a grain of salt. Internal discussions are still ongoing.
  8. Upvote
    Decker2124 gave kudos to foxtigerjungle in Ransomware Remediation   
    Hi,
    I saw Ransomware Remediation as a new feature on the main page. Will this feature also be available in the Ultimate version?
     
    Greetings
     
  9. Upvote
    Decker2124 gave kudos to Marcos in ESET Protect not working   
    The issue is being investigated. We'll keep you posted.
    We apologize for the inconvenience.
  10. Upvote
    Decker2124 received kudos from amralaa in Windows Application control state in 2025 ?   
    Thanks ! I was hoping to control all of that from within ESET PROTECT :/ I believe some BYOD might have Win 11 not-Pro too. MAnaging and receiving alerts in PROTECT would make this so much more efficient.
  11. Upvote
    Decker2124 gave kudos to Marcos in Effectiveness of Folder Guard Function in ESET Smart Security Premium   
    Folder Guard is supposed to protect you from actual ransomware. The ransowmare does not run FAR which you have and probably you're using an older version which is already trusted and therefore file modification is allowed. However, this is not what FG is supposed to block. Of course, we plan to improve FG further via HIPS module updates. The upcoming HIPS module 1481 will bring further hardening to FG.
  12. Upvote
    Decker2124 gave kudos to foxtigerjungle in ESET Home fails ransomware test   
    I didn't even see that. That's very interesting.
    Do they want to make ESET look bad on purpose?

    Bitdefender 10/15/2024
    Malwarebytes 10/14/2024
    Kaspersky 10/11/2024
    ESET 05/29/2024
  13. Upvote
    Decker2124 gave kudos to bentitli in Win64/CoinMiner.QS: AlructisitService cleaned but still running after reboot   
    Thank you for your response! I appreciate the suggestion to use the ESET log Collector. I will collect the logs from the affected machine and upload them shortly for further analysis.
    In the meantime, I’ve reconfigured ESET PROTECT to apply a more aggressive scanning approach and initiated another full scan. While I wait for the results, I’ll also work on gathering the necessary logs for better diagnostics.
    Could you also guide me on how to retrieve and interpret the detailed results from a full scan in ESET PROTECT? I want to ensure I don’t miss any information that might help identify residual threats.
    Thank you for your assistance!
  14. Upvote
    Decker2124 gave kudos to Marcos in Dashboard error: "Optimize your group tree structure" guide is not accessible   
    I've heard from a colleague that the button opens a wrong link, we are currently working on a fix.
  15. Upvote
    Decker2124 gave kudos to j91321 in Any way to use YARA rules with Protect/Inspect ?   
    I can see many ways how YARA rules could improve EI. 😄 One approach that we are exploring is integrating osquery into Inspect, which does support running YARA rules and has additional features that could nicely supplement current Inspect capabilities. However, it's too early to tell if it'll ever make it onto roadmap.
    I would suggest pairing Inspect with Velociraptor if you need additional DFIR capabilities. You can deploy velociraptor agent on-demand with Protect by using the Software Install task (Installation of third-party software).
    If @itman is correct, this could still be possible to through ESET Inspect XML rule with a slightly different approach. You can use ModuleDrop operation to monitor dropped Driver files (isNative) which are signed by "Microsoft Windows Hardware Compatibility Publisher" and have low LiveGrid Popularity. These drivers won't be very common, I checked all the drivers mentioned in the Mandiant blog post and all of them have a very low LiveGrid Popularity. I haven't tested how noisy this rule is in production, but for threat hunting purposes I believe something like this could work:
    <definition> <operations> <operation type="ModuleDrop"> <operator type="AND"> <condition component="Module" property="IsNative" condition="is" value="true"/> <condition component="Module" property="SignerName" condition="is" value="Microsoft Windows Hardware Compatibility Publisher"/> <condition component="LiveGrid" property="Popularity" condition="lessOrEqual" value="3"/> </operator> </operation> </operations> </definition>  
     
  16. Upvote
    Decker2124 gave kudos to itman in Any way to use YARA rules with Protect/Inspect ?   
    Per the Mandiate article, attestation signed kernel mode drivers are positively identified by examining EKU in issuing CA cert. per below screen shot;

    My experience to date has been "Microsoft Windows Hardware Compatibility Publisher 2014" issuing CA cert. is enough to positively identify an attestation signed kernel mode driver.
  17. Upvote
    Decker2124 gave kudos to itman in Any way to use YARA rules with Protect/Inspect ?   
    What the OP is interested in is using Mandiant YARA rules for detection of attestation signed drivers as noted here: https://forum.eset.com/topic/43619-malware/#findComment-194325 .
  18. Upvote
    Decker2124 gave kudos to itman in Is threat neutralized ? Suspicious Nvidia Signed module was dropped [E0464]   
    The way I interpret this is steam.exe is creating an executable using previously stolen nVidia code signing certificate/s. A strong indicator that the executable is probably malicious.
    I would update Steam to its latest vendor sourced version.
  19. Upvote
    Decker2124 gave kudos to bentitli in Win64/CoinMiner.QS: AlructisitService cleaned but still running after reboot   
    I’m also encountering this issue right now. I’ve dealt with similar symptoms—bogus AVs, PUAs, and a persistent process hogging CPU resources. Even after running a full scan with ESET PROTECT and removing CoinMiner threats, the problematic service continues to drain resources.
    I’ve tried reconfiguring ESET to run a more aggressive scan as well, but I’m still searching for a permanent fix. Have you found a reliable way to completely eliminate the "Alructisit" process and service?
  20. Upvote
    Decker2124 gave kudos to garioch7 in Congratulations on Product of the Year 2024   
    I too congratulate ESET on achieving such a prestigious award.  It is indicative of the expertise and dedication of the entire ESET organization.
    Take a bow, everyone.  Well deserved.
    Though not tested or rated by AV-Comparatives, I would also like to commend, in particular, @Marcos and @itman , for the tremendous customer support they provide on the ESET Forums.  No question goes unanswered.  Thank you, gentlemen.
    Have a great day.
    Regards,
    Phil
  21. Upvote
    Decker2124 gave kudos to itman in Win64/CoinMiner.QS: AlructisitService cleaned but still running after reboot   
    What appears to be the source of this is AlructisitApp.exe that is the update/network connectivity mechanism for this coinminer. The attacker not content with mining coin anymore decided "to up the ante" and drop some malware.
    Luckily, what was dropped was malware that Eset had a sig. for resulting in Eset detecting and deleting it. However, what if this was a backdoor or malware not detected by Eset?
    This event is a great example of why all modifications made by malware need to be eliminated.
  22. Upvote
    Decker2124 gave kudos to itman in Malware   
    I just came across this excellent article by Mandiant I was not aware of about attestation signed malware including drivers: https://cloud.google.com/blog/topics/threat-intelligence/hunting-attestation-signed-malware . In the article, they give a YARA rule for detection of attestation signed drivers. This means that security solutions could detect these drivers if they chose to do so.
  23. Upvote
    Decker2124 gave kudos to itman in Malware   
    Below is the latest version of amdi2c.sys available for Win 10 from the Win Update Catalog. Notice that this driver is indeed WHQL signed; 

     
  24. Upvote
    Decker2124 gave kudos to itman in Win64/CoinMiner.QS: AlructisitService cleaned but still running after reboot   
    I reviewed the video again and the author was looking for pinaview.exe which this coinmining malware also often deploys.
    Pinaview is legit proxy software: https://pinaview.com/ that is frequently misused by attackers. As such, it is classified as a PUA by many AVs including Eset;
    If deployed by this coinminer, a folder is created in C:\Users\xxxxxxx\AppData\Local\Programs and pinaview.exe created in that folder as a hidden file.
    -EDIT- As shown previously, pinaview.exe can be renamed to Barousel.exe; Eset current detection at VirusTotal, or Stopabit.exe. These .exe's could also be created in C:\Users\xxxxxxx\AppData\Roaming\Microsoft\Windows\Start Menu\Programs folder.
  25. Upvote
    Decker2124 gave kudos to itman in Win64/CoinMiner.QS: AlructisitService cleaned but still running after reboot   
    My preference is to run all Eset real-time settings at Aggressive level.
    Are you still receiving Eset detections after a system restart with PUA setting enabled? If this is the case, it appears from this video: -EDIT- appears the link I saved doesn't direct to the video anymore, C:\Program Files (x86)\AlructisitApplication folder has to be manually deleted in Safe mode.
×
×
  • Create New...