Malware detection relates to any form of discovering whether or not a file contains undesired source instructions, that would perform malicious instructions, ranging from stealing information, directing users to unrequested actions, or even damaging the hardware. Detection attemps to discover malware while not allowing it to be executed, for this reason, most detections search for "footprints", i.e. sequencial binary code in its instructions.
Questions tagged [malware-detection]
233 questions
0
votes
1 answer
Apache server security and cPanel scanning?
Is there a way (or a cPanel add-on) that will continually scan sites for exploits/malware/vulnerabilities from WHM or cPanel?

user1877662
- 1
- 1
0
votes
1 answer
My app is detected as malware
Situation
There is an installer for desktop application. When it runs, it unpacks some executalbe files, executes them, writes to registry, etc. Every executable file and installer itself is written by out team, is not aimed to do any harm to user…

Nadya
- 73
- 2
- 10
0
votes
1 answer
Can I test the validity of an image file before uploading it in ASP.NET?
I have an ASP.NET web application that allows the user to upload a file from his PC to a SQL Server database (which is later used to generate an image for an tag). Is there an "easy" way to test the image within .NET to validate that it does not…

Don Del Grande
- 411
- 6
- 20
0
votes
1 answer
Internet Explorer and Chrome recognize my software as a virus
I developt a nice software and I wanted to publish it online, I make a nice website for the download, but it seem that Internet Explorer and Chrome recognize my software as a virus and post a download warning to the users how want's to install it, I…

TEST ME
- 123
- 2
- 9
0
votes
2 answers
How to get rid of b9g.ru iframe injected on to a website
I have done a website whose URL is http://www.netbramha.com
Unfortunately after the end of each page, I have the following piece getting added
The src is from b9g.ru.
I have…

Akash
- 25
- 2
0
votes
2 answers
Shellcode searching for Bytes String: 0C330408Bh
I am learning how malware(Blackhole Exploit) works. I extracted the shellcode from a malicious code. I figured out everything except a search for the Byte String. Can anyone help me with this? Why does this shellcode (most of the malicious…

Abhineet
- 5,320
- 1
- 25
- 43
-1
votes
1 answer
Python Modules Safe?
I'm not a professional at recognizing security in Python modules, but is one of these Python modules possibly dangerous or contains malware?
altgraph 0.17.3
atlassian-python-api 3.39.0
attrs …

Legendview
- 9
- 1
-1
votes
1 answer
How a suspicious links are being added to my asp.net site
I have a simple asp.net website. Recently, I have noticed it adds one div with an anchor tag to an external. I have also noticed another link of apparent jQuery file from a thirdparty site that obviously is not a jQuery at all.
So when clicked…

marifrahman
- 681
- 2
- 13
- 31
-1
votes
1 answer
Intercepting filesystem calls of other processes on MacOS Ventura
There are various ways to monitor filesystem access on MacOS Ventura, like fs_events or the new Endpoint Security System Extension framework.
Is there a way to intercept and potentially prevent a filesystem call of another process? Similarly to how…

Yuri
- 3
- 2
-1
votes
3 answers
Unable to install LMD on CentOS 7.9.2009 (core)
Can someone please help me with this? I'm attempting to follow the below guide on installing LMD (Linux Malware Detect) on CentOS.
https://www.tecmint.com/install-linux-malware-detect-lmd-in-rhel-centos-and-fedora/
The issue that I am having is that…

Jesse C.
- 1
- 3
-1
votes
2 answers
How to create a IP whitelist for avoid false positive?
To avoid false positive, how can we create a whitelist of IP or Range of IP. I tried to create a IP whitelist by using resolving IP of the whitelist domain. Do you guys have any idea?

Izahaak
- 11
- 3
-1
votes
1 answer
Is that malware?
i found a file with the code given below in my public_html.it is a wordpress website.is it a malware or backdoor?Can i identify how this code was injected from this file?

razu
- 1
- 3
-1
votes
1 answer
Started Kaggle Problem : Microsoft Malware Classification IN GCP
Steps:
Created account in GCP
configured everything
While trying to launch Jupyter notebook in GCP after connecting through SSH and pasting the IP in browser followed by port - getting error , means i am not able to load url - PLEASE HELP
how…

user2986845
- 75
- 1
- 2
- 8
-1
votes
1 answer
Database to store large binary files of malware
So, I am trying to create a database that can store thousands of malware binary files with sizes ranging anywhere from kb's to 50 mb. I am currently testing with cassandra using blobs but of course with files that big cassandra isn't handling it…

Justin
- 1
- 1
-1
votes
1 answer
How can i hide VM-related registry keys and processes from malware VM detection techniques?
I built a malware analysis test lab and i used Pafish to detect analysis environment and i want to patch some fault. How could I hide the registry keys and processes from malware VM detection?

nln
- 1