Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   626

Really good and first line of defense if program is binded with malware

by buddy1989 - 12 June, 2021 - 05:57 AM
This post is by a banned member (buddy1989) - Unhide
buddy1989  
Registered
11
Posts
2
Threads
3 Years of service
#1
[Image: DXykEBA.png]

[Image: 62MuV4H.png]




Its crazy that something so obvious and common sense is often over looked. But it shoudnt be. Notice on these images that some of the files were modified A LOT ealier than the .exe file or other files? Common Sense people. If you have openbullet and hits.txt is modified at a different date than Openbullet.exe then that is one thing. Now it could still be backdoored or have a virus binded to it but chances are whenever you got a hit thats when the date was modified. 

But take the second picture for as example. Why in the world would the tutorial be modified in 2017 but the .exe file modified in 2021? I will tell you why. Because someone used a binder or crypter and binded the original program with a virus/rat/malware etc and then uploaded it to original folder where the tutorial was at. 


I am making this post because I hope everyone starts looking at their modified dates when they download from this website and nulled. You will soon realize why in the world am i downloading from this website or nulled. 90% of the files are uploaded simply to spread miners, rats, botnets etc. Seriously....start paying attention!
This post is by a banned member (Ping) - Unhide
Ping  
Staff
2.607
Posts
85
Threads
Staff Team
6 Years of service
#2
A better solution to validate if the actual source code of the software has been altered in any way, regardless of how infistimal a change it may be would be to verify the actual checksum hash value of the application you have, to those provided by the original source provider, which more often than not will have these values posted for others to verify the integrity of the application.

Related article for some useful information: https://www.computerhope.com/issues/ch001846.htm

Although seeing obscured or unusual modified dates of certain files could without a doubt be a good indicator that you should further analyze the authenticity of the software's integrity.
[DM to purchase Signature Ad Slots]

[Ping's PGP Key]
I am NOT affiliated with any "Ping" shops, or services being marketed over this forum.
Before conducting any form of business confirm my identity through onsite PM.
This post is by a banned member (bamita3448) - Unhide
22
Posts
0
Threads
3 Years of service
#3
thanks
This post is by a banned member (hasi912) - Unhide

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 2 Guest(s)