Hacking
Casual
899

How To Make Malware Bypass Antivirus






  12-Apr-2021 23:57:51



Hello sir i want to talk about malware i was create malware for computer but i have big problem. Umm my program was detected by antivirus for example avast, windows security, malware byte, and other, tell me how to make undetected malware in computer? i was learn about malware, programming, how malware work, and other. Umm what should i do?

anyone have secret technique? greetings

*Beware click the link!


DISCUSSION



12-Apr-2021 23:58:38

Sorry dont think so




Reply

You can disable antivirus 




Reply


13-Apr-2021 00:06:26



How? tell me please 


Reply


13-Apr-2021 00:08:45



Using regedit editor, but i dont sure. I mean i dont much understand windows regedit


Reply


13-Apr-2021 00:09:32



Its ok no problem


Reply

Hello nice to meet you, what virus you created ? Ransomware ? or etc ? 




Reply


13-Apr-2021 00:23:24



Oh hello nice to meet you, umm i was create spy malware, and i mix it with Metasploit. Sorry about that do you know metasploit right? 


Reply


13-Apr-2021 00:25:38



Wow nice good project, what programming language will used, and how it works ? Yess i know metasploit, yep i was use Metasploit Meterpreter a time ago

On average, Metasploit Meterpreter is often detected by antivirus, if you want to make FUD you must know about antivirus works, your target operating system


Reply


13-Apr-2021 00:26:12



Umm how i learn about antivirus? can you more explain? 


Reply


13-Apr-2021 00:27:05



Hmmm wait a minute 


Reply


13-Apr-2021 00:34:16



Hello sir?


Reply


13-Apr-2021 00:37:18



Imo ( in my opinion ). This is what I caught and I understand the flow of antivirus. There are several stages and many more that I haven't mentioned

Signature detection

Here every file must have a siganture, except .html, .css does not have a signature, this technique will be carried out by the antivirus if the siganture of the file is entered in their antivirus database. Then it will be immediately recognized as a virus, to cheat an antivirus, we need a survey and analysis, after which we change our siganture by means of dynamic or static analysis.

Full protection

Has adequate protection for all lines, both for blocking viruses, Trojans, malware, spyware. This protection is comprehensive for email, files, internet, ftp and incoming and outgoing connections.

Behavior-based detection 

If a virus passes the above detection methods, the antivirus then observes the behavior of programs running on the computer. 

The antivirus triggers a warning if a program begins to perform strange actions listed below :

  • Settings of other programs are changed
  • Dozens of files are modified or deleted
  • Remotely connecting to computers

This is a useful method for finding viruses or any other type of malware that attempt to steal or log information.

Sandbox machine 

Last, This machine will work and identify the program if the danger will be detected as a virus, the function of the sandbox is to try a programm

Conclusion 

If you want to learn, it is not easy, and very long, it takes time, for example you should learn programming, anaylis, reverse engineering, operating system

and more. 

Hehehe sorry my english bad, you can visit this post : Malware Evasion Encyclopedia, 50 technique malware used - Forum Seccodeid 


Reply


13-Apr-2021 00:39:08



Ummm im appreciate it, but any other ways i can do this?


Reply


13-Apr-2021 12:47:37



Maybe you should change signature then i suggest encode your source code 


Reply


15-Apr-2021 00:17:54



But how? i don't have idea 


Reply


13-Apr-2021 17:34:24



Hmmm, you can use rubber ducky, and disable antivirus, then you can http request using ducky script, last your programm can auto run in your target computer 

Read this : https://null-byte.wonderhowto.com/how-to/use-usb-rubber-ducky-disable-antivirus-software-install-ransomware-0180418/   



Reply


15-Apr-2021 00:17:21



What is rubber ducky? ummm i just heard that!


Reply


16-Apr-2021 00:04:20




Reply


18-Apr-2021 01:13:36



Just buy on Hak5, but if you dont have much money, maybe you can made using arduino or anything 


Reply


21-Apr-2021 03:19:42



Yes, you can build using raspi zero w or esp8266


Reply




13-Apr-2021 05:29:05

I dont know dude 




Reply

Exe or still in source code? you can use encoding technique in your code (Obfuscation) you just encoding your programs https://resources.infosecinstitute.com/topic/malware-obfuscation-encoding-and-encryption/ && https://securityintelligence.com/an-example-of-common-string-and-payload-obfuscation-techniques-in-malware/ 




Reply


15-Apr-2021 00:18:26



Really? what encoding to use?


Reply


16-Apr-2021 00:05:55



I think Base64 is often used to encode malware. It sounds like a covert military language but it’s actually a common binary-to-text encoding scheme. 

It was built to encode and decode in the service of the Multipurpose Internet Mail Extensions (MIME) internet standard which formats emails for transmittal.

The essential purpose of Base64 is to standardize code. Malicious programmers take advantage of this by injecting false character strings that mimic standard Base64. 

The code looks standard and functions normally until it’s decoded, literally malware using simple obfuscation like codepacking or encoding with Base64.


Reply


21-Nov-2021 01:14:24



Base64 is commonly used in malware to disguise text strings. 

https://blog.malwarebytes.com/threat-analysis/2013/03/obfuscation-malwares-best-friend/ 


Reply


21-Nov-2021 21:22:49



Thanks


Reply

Login for report, comment and join discussion
Login Here
Sponsored

Popular Posts
Gps Tracker Seccodeid Free Too...
General
21355
204
Top


Djie sam soe Djie sam soe
Complete Basic Course in Kali...
Linux
14374
4
Top


Djie sam soe Djie sam soe
Komintod (Ministry of Communic...
Data Leak
6512
94
Top


Murtad methamphetamine Murtad methamphetamine
Free Proxy List
Networking
3625
3
Top


Sandidi Sandidi
Mass Reverse IP Unlimited
Tools Hacking
3398
15
Top


ImamWawe ImamWawe

Related Post

Youtube Video

Subscribe