Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 946 Vote(s) - 3.53 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Crypters - HELP please

#1
Antiviruses are becoming more powerful every day, hence the question arises, do the crypters themselves know how to download updates to infected files over the Internet?
Reply

#2
Moved from Remote Administration & Stress Testing to Requests.
Reply

#3
Crypters usually depending on if its scantime, and runtime have different methodologies they use for encryption, but generally runtime which is what seems to matter most in terms of longevity use whats called a RunPE alongside the obfuscation of the crypter, this is what you know as the "Stub", when a runPE is detected, or the coding methods used are identified by antivirus vendors as malicious the instructions are added to antivirus database definitions, so when av's scan a file, they have a record of whats "found", its an endless game of cat, and mouse. the best thing for a crypters longevity is finding one thats good at preventing reverse engineering alongside a well coded runpe.
Reply

#4
Quote:(01-05-2023, 04:04 PM)PYA Wrote:

[To see links please register here]

Crypters usually depending on if its scantime, and runtime have different methodologies they use for encryption, but generally runtime which is what seems to matter most in terms of longevity use whats called a RunPE alongside the obfuscation of the crypter, this is what you know as the "Stub", when a runPE is detected, or the coding methods used are identified by antivirus vendors as malicious the instructions are added to antivirus database definitions, so when av's scan a file, they have a record of whats "found", its an endless game of cat, and mouse. the best thing for a crypters longevity is finding one thats good at preventing reverse engineering alongside a well coded runpe.
Do I understand correctly that just by picking up a good crypter, you can forget about monitoring and it will do everything by itself, including auto-updating?


Quote: (01-05-2023, 05:31 PM)schoolme Wrote:

[To see links please register here]

Quote: (01-05-2023, 04:04 PM)PYA Wrote:

[To see links please register here]

Crypters usually depending on if its scantime, and runtime have different methodologies they use for encryption, but generally runtime which is what seems to matter most in terms of longevity use whats called a RunPE alongside the obfuscation of the crypter, this is what you know as the "Stub", when a runPE is detected, or the coding methods used are identified by antivirus vendors as malicious the instructions are added to antivirus database definitions, so when av's scan a file, they have a record of whats "found", its an endless game of cat, and mouse. the best thing for a crypters longevity is finding one thats good at preventing reverse engineering alongside a well coded runpe.
Do I understand correctly that just by picking up a good crypter, you can forget about monitoring and it will do everything by itself, including auto-updating?


I just don't know what the technical process itself looks like
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through