查看: 6760|回复: 18
收起左侧

[资讯] AVLab.pl: Test of free malware scanners

[复制链接]
petr0vic
发表于 2017-2-20 18:45:02 | 显示全部楼层 |阅读模式
Tested software:
  • Arcabit Skaner Online 1.0.4
  • ClamWin Free Antivirus * 0.99.1
  • Comodo with Cleaning Essentials 2.5.242177.201
  • Dr.Web CureIt! 11.1.2
  • Emsisoft Emergency Kit 11.9.0.6508
  • ESET Online Scanner 2.0.12.0
  • Kaspersky Virus Removal Tool 15.0.19.0
  • Malwarebytes Antimalware Free 2.2.1.1043
  • Panda Cloud Cleaner 1.1.9
  • Sophos Clean (dawniej HitmanPro) 3.7.13.262
  • Trend Micro HouseCall (1.62)
  • Windows Defender * 4.10.14393.0

* CLAMWIN FREE ANTIVIRUS I WINDOWS DEFENDER PROVIDES
REAL-TIME PROTECTION, BUT WE DIDN’T TAKE IT INTO ACCOUNT.
DURING SCAN, PROTECTION HAS BEEN DISABLED.





Curing infected system



+ a sample was detected or operating system was cured
- a sample was undetectable for tested solution

* SOMETIMES THE SCANNER REQUIRED OPERATING SYSTEM REBOOT IN ORDER TO REMOVE THREAT.
IN THOSE TWO CASES, INFECTION WAS REMOVED ONLY IN RESCUE MODE.

sample A:
backdoor Kelihos
— causes the infected workstation to send
spam, steal sensitive information, download and run other infected files
including trojans. Infected bot uses P2P connection to communicate with
other zombie computers. I decentralized network, infected machine can
operate as client or server C2 receiving and sending commands from
control and management system.
sample B:
backdoor Careto
— includes highly sophisticated malicious
software consisting of a rootkit and bootkit. Observed by researches
variations shows, that all version of this malware are indented for 32-
and 64-bit Mac OS X, Linux, Windows and (probably) Android and iOS
(also BlackBerry OS – unconfirmed information) systems. Because of its
capabilities, Backdoor Careto (sometimes called The Mask) is believed to
be the work of a nation state.
Backdoor Careto can capture network traffic, keystrokes, Skype
conversation, PGP keys. It’s able to analyze WiFi traffic, monitor all file
operations, collect a list of documents from infected system, including
encryption keys, VPN configuration, SSH keys and RDP files. In terms of
sophistication, Backdoor Careto is one of the most advanced APT
threats.
sample C:
keylogger Ardamax
— commercial spyware, which was used in
one of the social engineering campaign “the bailiff” aimed toward Polish
citizens. With this tool it is possible to automatically send collected logs
and data to any e-mail address or FTP account.
Keylogger Ardamax can: record keystrokes, save web browser history,
capture video and sound from web camera, intercept text from clipboard,
monitor AIM, Windows Live Messenger, ICQ, Skype, Yahoo Messenger,
Google Talk, Miranda and QiP communicators. Stored information can be
send to indicated e-mail address or FTP account.
sample D:
trojan Emotet
— stores its files in system registry to hide from
antivirus software. Trojan Emotet with modular design contains: its own
installer, a banking module, an anti-spam bot, a module for stealing
contacts from popular email clients (is able to spread, can steal addresses
from email clients and send the same spam messages to victims from a
contact list), module for DDoS attacks (Nitol DDoS bot).
Trojan Emotet contains a list of popular banks. If infected user visits one
of the defined URLs, Emotet records all data send between user and
website – even if website is encrypted with HTTPS protocol.
sample E:
trojan downloader
— as the name suggests, trojan downloader
contains malicious and potentially unwanted software, which is
downloaded and installed on infected system. Downloaded in this way
dropper file installs a appropriate virus, which can then be used for
different purposes.
Dropper files are often used to carry known trojans, because it is much
easier to create dropper file than completely new trojan, which antivirus
software won’t be able to detect.
In the test, we used Trojan, which creates few files on disk. One of them
downloads additional malicious software.
sample F:
trojan Poweliks
— uses a vulnerability in Microsoft Word and
with a maliciously crafted Word document, which is distributed via email,
installs additional code, that is a PowerShell script encoded in
Base64 triggering and executing a low-level program (shellcode) written
in assembler. In the final stage, shellcode executes binary program, which
tries to communicate with encoded IP addresses to receive futher
commands from C&C servers.
Trojan Powerliks can be used to download and execute files. Its actions
are stored in the registry – it doesn’t create any file on the hard disk, so
to detect this threat, it’s required to recognize infected Word document
or protect / scan registry.



More info: https://avlab.pl/sites/default/f ... alware_scanners.pdf

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x

评分

参与人数 1分享 +1 收起 理由
屁颠屁颠 + 1 版区有你更精彩: )

查看全部评分

young2288
发表于 2017-2-20 19:13:59 | 显示全部楼层
来看看图
tomochan
发表于 2017-2-20 21:43:38 | 显示全部楼层
windows defender好亮哦
ericdj
发表于 2017-2-20 22:27:44 | 显示全部楼层

这是WD又被打回基准线的节奏?
微软粑粑能忍?


嗯~~咖啡何在?
cooch
发表于 2017-2-20 22:57:29 | 显示全部楼层
咖啡进了INTEL也没见太大改进呢
ShirahimeKanata
发表于 2017-2-20 23:10:49 | 显示全部楼层
本帖最后由 ShirahimeKanata 于 2017-2-20 23:21 编辑

我开源ClamAV居然比闭源主义的WD好,赞!

WD还有动态启发呢,ClamAV没有启发都比WD好?

然而实际上样本区测试ClamAV。。。

http://bbs.kafan.cn/thread-2077604-1-1.html

http://bbs.kafan.cn/thread-2077437-3-1.html
540923555
发表于 2017-2-21 08:59:23 | 显示全部楼层
WD输给毛豆,这不太可能啊。。。。。
con16
发表于 2017-2-21 09:25:44 | 显示全部楼层
本帖最后由 con16 于 2017-2-21 09:31 编辑
540923555 发表于 2017-2-21 08:59
WD输给毛豆,这不太可能啊。。。。。


因為是Comodo with Cleaning Essentials
毛豆的惡意程式清除工具

用CIS,CFW要另外裝
進階任務清理結束點那邊點下去才會問你要不要安裝

這個是當初防毒太軟腳,另外出的補助工具
540923555
发表于 2017-2-21 11:20:09 | 显示全部楼层
con16 发表于 2017-2-21 09:25
因為是Comodo with Cleaning Essentials
毛豆的惡意程式清除工具

个人感觉WD如果连网的话,不应该输给CCE
Eyelesshan
发表于 2017-2-21 11:25:34 | 显示全部楼层
ESET的高启发做的真是很棒的
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-11-25 00:39 , Processed in 0.143518 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表