楼主: wwwab
收起左侧

[病毒样本] 样本1x

[复制链接]
TXR
发表于 2024-8-1 14:09:42 | 显示全部楼层
火绒解压报毒

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
DisaPDB
发表于 2024-8-1 14:09:56 | 显示全部楼层
ANY.LNK
发表于 2024-8-1 15:13:18 | 显示全部楼层
微软:目前机器学习Trojan:Win32/Phonzy.B!ml
喀反
发表于 2024-8-1 16:09:54 | 显示全部楼层
ANY.LNK 发表于 2024-8-1 15:13
微软:目前机器学习Trojan:Win32/Phonzy.B!ml

这。。。还能不一样的

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
ANY.LNK
发表于 2024-8-1 16:10:59 | 显示全部楼层
喀反 发表于 2024-8-1 16:09
这。。。还能不一样的

嗯……ML报法是挺多变的
scottxzt
发表于 2024-8-1 16:52:52 | 显示全部楼层
ANY.LNK 发表于 2024-8-1 15:13
微软:目前机器学习Trojan:Win32/Phonzy.B!ml

机器学习的意思是云鉴定吗?
ANY.LNK
发表于 2024-8-1 17:01:19 | 显示全部楼层
scottxzt 发表于 2024-8-1 16:52
机器学习的意思是云鉴定吗?

不能完全等同,机器学习也有本地的。

就算是涉及到云的机器学习,也是通过AI提供一个大致的可疑程度,依据云和本地客户端的配置,决定是否通过DSS下发和下发什么样的机学检测
00006666
发表于 2024-8-1 17:06:40 | 显示全部楼层
scottxzt 发表于 2024-8-1 16:52
机器学习的意思是云鉴定吗?

云+本地

In the cloud:

Metadata-based ML engine – Specialized ML models, which include file type-specific models, feature-specific models, and adversary-hardened monotonic models, analyze a featurized description of suspicious files sent by the client. Stacked ensemble classifiers combine results from these models to make a real-time verdict to allow or block files pre-execution.
Behavior-based ML engine – Suspicious behavior sequences and advanced attack techniques are monitored on the client as triggers to analyze the process tree behavior using real-time cloud ML models. Monitored attack techniques span the attack chain, from exploits, elevation, and persistence all the way through to lateral movement and exfiltration.
AMSI-paired ML engine – Pairs of client-side and cloud-side models perform advanced analysis of scripting behavior pre- and post-execution to catch advanced threats like fileless and in-memory attacks. These models include a pair of models for each of the scripting engines covered, including PowerShell, JavaScript, VBScript, and Office VBA macros. Integrations include both dynamic content calls and/or behavior instrumentation on the scripting engines.
File classification ML engine – Multi-class, deep neural network classifiers examine full file contents, provides an additional layer of defense against attacks that require additional analysis. Suspicious files are held from running and submitted to the cloud protection service for classification. Within seconds, full-content deep learning models produce a classification and reply to the client to allow or block the file.
Detonation-based ML engine – Suspicious files are detonated in a sandbox. Deep learning classifiers analyze the observed behaviors to block attacks.
Reputation ML engine – Domain-expert reputation sources and models from across Microsoft are queried to block threats that are linked to malicious or suspicious URLs, domains, emails, and files. Sources include Windows Defender SmartScreen for URL reputation models and Office 365 ATP for email attachment expert knowledge, among other Microsoft services through the Microsoft Intelligent Security Graph.
Smart rules engine – Expert-written smart rules identify threats based on researcher expertise and collective knowledge of threats.

On the client:

ML engine – A set of light-weight machine learning models make a verdict within milliseconds. These include specialized models and features that are built for specific file types commonly abused by attackers. Examples include models built for portable executable (PE) files, PowerShell, Office macros, JavaScript, PDF files, and more.
Behavior monitoring engine – The behavior monitoring engine monitors for potential attacks post-execution. It observes process behaviors, including behavior sequence at runtime, to identify and block certain types of activities based on predetermined rules.
Memory scanning engine – This engine scans the memory space used by a running process to expose malicious behavior that may be hiding through code obfuscation.
AMSI integration engine – Deep in-app integration engine enables detection of fileless and in-memory attacks through Antimalware Scan Interface (AMSI), defeating code obfuscation. This integration blocks malicious behavior of scripts client-side.
Heuristics engine – Heuristic rules identify file characteristics that have similarities with known malicious characteristics to catch new threats or modified versions of known threats.
Emulation engine – The emulation engine dynamically unpacks malware and examines how they would behave at runtime. The dynamic emulation of the content and scanning both the behavior during emulation and the memory content at the end of emulation defeat malware packers and expose the behavior of polymorphic malware.
Network engine – Network activities are inspected to identify and stop malicious activities from threats.




本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
scottxzt
发表于 2024-8-1 17:17:40 | 显示全部楼层
后台这方面,对于红伞和ESET来说,MD已经远远超越了它们,以前测红伞和ESET,作为云鉴定它们只能报部分,现在MD扫描不报,双击都是通杀·的,不管是人工上传样本,还是自动上传样本,反应速度的确快。
御坂14857号
发表于 2024-8-1 20:44:32 | 显示全部楼层
又是Tomcat

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-9-10 05:32 , Processed in 0.091579 second(s), 14 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表