system
1
Hello out there,
Vanish can create trojans and backdoors based on Metasploid/Meterpreter.
Only 23% of the scanners find this malware.
You can take a look on the binarys if you want:
hxtp://www.evil-s**t.de/vanish/
The password for the crypted 7zip file is: “123456”
But an other question: Why didn’t the behavoiur shiled doesn’t react?
Oh and I’m using the free version with updated signatures.
If you are german, you can watch the whole YouTube video here:
https://www.youtube.com/watch?v=NiCdvszgPpM
Greetings from Germany
Matze
Pondus
2
system
3
Hey,
I hope so ^^. I’m not really in how the others do it. I’ve avast ;).
But anyway: Why doesn’t detect the behaviour shield the backdoors?
The way how they do it should be often used, doesn’t it?
Greetings
Matze
Pondus
4
all files are now detected by Malwarebytes - Trojan.Backdoor
still not detected by avast and superantispyware…
Pondus
5
polonus
6
Hi Pondus,
Also interesting the ThreatExpert report: http://www.threatexpert.com/report.aspx?md5=2f8082afa07c3c881e2b1bf41ecbdaff
In the wild, this malware is known to connect to the following servers:
202.54.98.156 via TCP port 4444
10.10.10.31 via TCP port 443
188.50.82.246 via TCP port 1234
polonus