- Jul 29, 2017
- 10,095
- 117,951
...cyber aids......
...cyber aids......
delusions aren't a lie if you believe in themthey wouldn't lie.....
I just assumed it was a repository of downloads related to the forum like those old rom sites which had forums and download siteThe fact that the site looks completely different didn't make you suspicious?
That's good to know Yeah Bitdefender's security/system scan should give you the reassurance that you need that there are no threats.Downloaded bitdefender total security trial and did a attack trace scan and system scan. Luckily nothing found
No, typically we don't (i.e., F95) doesn't archive a content repository of other downloads/files on another mirror site. We also don't store any files on the site, but merely link to other sites/services.repository of downloads related to the forum
Even if we had one of those, the logo would still be the same.I just assumed it was a repository of downloads related to the forum like those old rom sites which had forums and download site
Class:You must be registered to see the links
A malicious program designed to electronically spy on the user’s activities (intercept keyboard input, take screenshots, capture a list of active applications, etc.). The collected information is sent to the cybercriminal by various means, including email, FTP, and HTTP (by sending data in a request).
Platform:You must be registered to see the links
Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.
I blame my horny brain, rookie mistake that should not have happened by nowEven if we had one of those, the logo would still be the same.
Original:
View attachment 4441666
Fake:
View attachment 4441665
Look here, it's the offical status site for F95zone. It's not .to but .com and has the same logo.
You must be registered to see the links
View attachment 4441676
Ah, Kaspersky, yes they also provide good A/V software too. I was gonna recommend them as a close second to the ones I indicated in my previous post.downloaded Kaspersky to scan the malicious file and unlike the rest (malwarebytes, windows defender, bitdefender) Kaspersky actually detected the malicious file as HEUR:Trojan.Win32.Lazzzy.gen
Yeah, that's good to know. Doing a full system scan with Kaspersky would be a good option as a follow-up system health check procedureI understand now what happened, since its a win32 virus it wouldn't run on my 64bit windows 10 installation and thank god i did not click on the run in compatibility mode prompt i got after the setup failed to run
Yeah, it's good to raise awareness of other copycat sites if others might make the same mistake. It's not a big deal, dw about it We all overlook such things from time to time, as it's in human nature to misremember and/or make accidental errors here and there. Accidents happen after allhopefully be indexed by search engines and help other horny bastards in the future
There's only one site, and it's F95zone.toI just assumed it was a repository of downloads related to the forum like those old rom sites which had forums and download site
That... does seem kinda scary. I would consider reinstalling Windows.So lore update:
I wanted to know more about the malicious file so i redownloaded it but this time without running (let alone admin authorization)
Since its a password protected file, I unpacked it and repacked it wihout password to so Total Virus could scan it (650MB limit)
Heres what it found:You must be registered to see the links
Using this as reference i downloaded Kaspersky to scan the malicious file and unlike the rest (malwarebytes, windows defender, bitdefender) Kaspersky actually detected the malicious file as HEUR:Trojan.Win32.Lazzzy.gen
Did a quick search and found thisYou must be registered to see the links
View attachment 4442115
So i think I understand now what happened, since its a win32 virus it wouldn't run on my 64bit windows 10 installation and thank god i did not click on the run in compatibility mode prompt i got after the setup failed to run
I think im clear but just to be extra careful, im now running a full scan with Kaspersky
Leaving this final update so it can hopefully be indexed by search engines and help other horny bastards in the future
I blame my horny brain, rookie mistake that should not have happened by now
Full system scan done, no detectionsYeah, that's good to know. Doing a full system scan with Kaspersky would be a good option as a follow-up system health check procedure
Im probably good, but my paranoid self has been contemplating thatThat... does seem kinda scary. I would consider reinstalling Windows.
another example of crappy AI generated answers. it's worded in a way that is misleading / essentially misinformationView attachment 4442115
So i think I understand now what happened, since its a win32 virus it wouldn't run on my 64bit windows 10 installation and thank god i did not click on the run in compatibility mode prompt i got after the setup failed to run
Interesting, I will add however that I did multiple full scans with multiple antiviruses (Eset, Bitdefender, Kaspersky, Malwarebytes, Windows Defender) and none of them detected any infectionsthe fact it "failed" to run is likely intentional. it serves as a logical distraction that's better than silently doing nothing in the background every time you click on it. the end user just assumes it doesn't work and goes on to the next thing.
meanwhile it's actually running some crap it dropped in the temp folder, copying cached credentials or whatever it wants and sending it off to the bad guys C2 server
which is what it looks like this malware did. as virustotal shows it reaching out to some random .shop & .biz domains that are often used by stealers as they don't really care about complaints or some shit
idk how well malwarebytes is with real time detection, if you even had that active (isn't that a premium feature?)If this stealer was imbedded into the system running in the background stealing data those antivirus would have detected it right?
i would too, just for peace of mind. it's good to do every once in awhile anywayBut yeah, I will probably use this as an excuse to clean install windows anyways
Thats what im asking tho, it could not have stealed anything before cause i didnt open any emails or accounts before doing a full scan with malwarebytes and the other antivirus i mentioned all with a full protection 30 day trial.idk how well malwarebytes is with real time detection, if you even had that active (isn't that a premium feature?)
defender is famously bad at stopping shit in real time. and stealer type malware is designed to not raise alarm. copy browser cache /extension data or whatever and send off to a random server then its done
i don't mean to sound like a fearmonger or something but some of the popular youtube cybersecurity channels ( like thepcsecuritychannel) have demonstrated malware like lumma and redline that just steal your data quickly and delete themselves without any persistence, so the victims never even realize they were attacked.
later down the line their accounts or money is stolen in some way because they never thought to change their passwords or anything, they didn't realize they had run malware
i would too, just for peace of mind. it's good to do every once in awhile anyway
there's more possibilities than just keyloggingThats what im asking tho, it could not have stealed anything before cause i didnt open any emails or accounts before doing a full scan with malwarebytes and the other antivirus i mentioned all with a full protection 30 day trial.
If it did steal anything before i installed those antiviruses it would just be random inputs from me playing a game and browsing online
So which accounts would i even change the password to if i did not open anything before doing the full scans with the anti viruses i mentioned
Brute force isn't mandatory.browser password managers also exist as a vulnerable file sitting on your computer, the credentials may be hashed but now they're exposed to offline bruteforcing attempts at least, if they even need to go that far to use them