Or maybe, you received a file, you're pretty sure it's malicious, and want to neutralize the threat for others?
This is the purpose of this thread.
If you receive a file, and want it analyzed, I will pull apart the file, analyze the threat. If there is a threat, I will make it known to antivirus engines.
If the threat is a RAT, I will report it to the coder of said rat, and get the criminal's license banned.
If there is a DNS, I will report it to the DCMA and have the DNS taken down.
What format to take when posting?
To prevent people accidentally downloading malware, we'll hash the links so that I can decrypt them myself and they won't appear as links to other user's on the forum.
Instructions:
When submitting a file, first either upload the file to a sharign site, or use the link yuo recieved when the file was sent to you. When you have the link, visit this website:
http://md5encryption.com/
Once in, enter the link into the textbox, and click 'Encrypt it!'
http://prntscr.com/d64hbd
Then, you should see the hash. Copy that, and submit the hash on this thread in this format!
http://prntscr.com/d64hln
- Code: Select all
Hash:
Where I got the file from:
Suspicions
Here is an example:
- Code: Select all
Hash: 155a6a7e059c83a8cb624677905d44af
Where I got the file from: Some kid on pb2 said it was pb2 sped hack m8
Suspicions: its not a sppedhack! dis file is fork bomb!
Please post your files and I will analyze them as soon as possible.