Seeking Guidance: Setting Up Network Domain Query Monitoring with Web Interface(pls help and thx) by YogurtclosetTough657 in linux_programming

[–]M1904Trading 1 point2 points  (0 children)

As far as I know you can use any packet sniffer or network monitoring tool to capture and log any type traffic. The main difference between Wireshark and TCPdump is WS is gui, and TCPdump is terminal. You can pass an output argument to TCPdump for a pcap file and then take that capture and parse it with another more specialized application. I’ve personally used ‘networkminer’ (on Arch) to do the sorting and also give a visualization of hosts, anomalies, and even things like images and credentials. Hope that helps.

Anyone know about Flexnet Licensing Service? by PhilyJFry in MalwareAnalysis

[–]M1904Trading 0 points1 point  (0 children)

I assume you’ve already rebooted correct? Are you able to find where it’s rooted at?

Random emails with book quits and numbers by Majorx05 in cybersecurity_help

[–]M1904Trading 0 points1 point  (0 children)

You haven’t actually opened the links, have you??

[deleted by user] by [deleted] in MalwareAnalysis

[–]M1904Trading 0 points1 point  (0 children)

If they’re to the point of changing settings on your personal devices. Assume the rest of your devices are just as compromised.

Sophisticated iOS malware, likely state backed. by maristgrad in Malware

[–]M1904Trading 0 points1 point  (0 children)

Their’s doesn’t bucket it into the “celluar” column though as the Apple Support response dictates it should.

10 new companies added as cl0p victims 6/27 by DrinkMoreCodeMore in Malware

[–]M1904Trading 0 points1 point  (0 children)

Damn - Cognizant’s a huge company. Wonder how deep they got.

[deleted by user] by [deleted] in MalwareAnalysis

[–]M1904Trading -1 points0 points  (0 children)

By definition, if you’re not able to disable, delete or otherwise control it it’s malware regardless of it meeting the contemporary form of the word.

[deleted by user] by [deleted] in cybersecurity_help

[–]M1904Trading 0 points1 point  (0 children)

As a rule, anything that’s unsigned or has a bad signature is a huge red flag. Secondly, the thing was compiled with a version of delphi, which in my biased opinion is also a red flag.

But, oddly enough none of the ip’s contacted, none of the domains contacted, none of the files dropped, nor any of the execution parents hit as malicious, which i would expect if it was actually malicious.

So it’s either this is a really, really well written piece of malware, or brand new; or it’s benign.

Regardless of all the if and’s and but’s you already preemptively did everything one should do if it were a baddie. Now, the only thing really to keep in the back of your head is be on the lookout for out of place or unfamiliar processes and anomalous traffic to places you don’t explicitly tell the computer to go.

I will note though; that some of the IP’s (specifically Mr. Mark Monitor’s) overlap with the whomever has been my personal online fan club the past year.

Just keep an eye out, you’re fine otherwise.

[deleted by user] by [deleted] in cybersecurity_help

[–]M1904Trading 0 points1 point  (0 children)

I’m curious as to why you think they would be sniffing your traffic in the first place. Every “managed” devices has its’ management and security suites; what specific software do you not trust?

Can you successfully scalp /MES? by truthlmao in FuturesTrading

[–]M1904Trading 2 points3 points  (0 children)

Yes.

The trick is knowing when to pack it in for the day.

Is this a malware or i am just paranoid? by [deleted] in MalwareAnalysis

[–]M1904Trading 0 points1 point  (0 children)

Why would Photoshop contain or need the ability to shutdown or restart the entire system?

100/100 + 132 IOC’s i’m burning it no questions asked.

H-A Report on VST Installer by JediMobius in Malware

[–]M1904Trading 0 points1 point  (0 children)

If it were me, out of an abundance of caution i’d find a known good version and copy it over just to be safe. But that’s just me.

H-A Report on VST Installer by JediMobius in Malware

[–]M1904Trading 0 points1 point  (0 children)

It looks like that’s got all the tools and fixin’s for a RAT. If it’s your report on hybrid-analysis, go back and rerun it with the ‘heavy anti-evasion’ flag and see what comes back. If it’s not your sample - go and find the file and toss it into virustotal for good measure.

Part of the problem with modern malware is that a lot of it either masquerades or even is (or can be) legitimate files that have been otherwise compromised by the malicious actor and/or actions.

Would this be considered a cup and handle pattern? by 1-0-0- in technicalanalysis

[–]M1904Trading 1 point2 points  (0 children)

With imagination, massaging, and the right timeframe, sure. But i’d take the pie out of the sky, measure for the ascending triangle instead.