This forum is for all the topics that don't fit anywhere else. Post anything from Hello's to Web Links.
 #136648  by HolyWarrior
 
Figured i post this and i want Jawfin to see this, i attempted to connect KR website and my malwarebytes caught a virus and stopped it. Apparently you have a virus on your forums. You might wanna check into that and clear up some stuff so others who visit here don't catch it too. Thanks!
 #136650  by jawfin
 
Doesn't work like that HW - I'd be checking to scan your computer for a Trojan. It would be a hijack, like, man in the middle attack. You could get HijackThis! to scan for suspects. Otherwise MWB supplies details of what it caught - so if you can share that it'll help identify the issue.
 #136653  by Raz0r
 
You might have picked something up when poking around SweetFX downloads as you mentioned :P
 #136682  by jawfin
 
Raz0r wrote:
You might have picked something up when poking around SweetFX downloads as you mentioned :P
As Razzy said - SweetFX is actually blocked by Chrome as malicious software. When I saw this I went into alert mode then, in relation to that download, off that site. I got the download via Internet Explorer (as Microsoft is less cautious than Google [eg. Java]) and looked into it.

The active component of sweetfx, being opengl32.dll was UPX compressed (as identified by looking at it in a hex-editor), that alone sends of massive alerts to any security conscious user. UPX is a real-time in-place compression - imagine a self-extracting zip executable with 1 file in it, being an application which gets unzipped and ran when the zip archive is opened - its like that but it all happens in memory. Point is, it's really only used to hide what the application really does, as you can't see the apps library imports and exports - all you see is a bunch of compressed data; therefore is used by the baddies to hide what it does.

So I decompressed opengl32.dll to convert it back to its original compiled state, that I actually could to that means it's either legitimate, or, the bad guy is too dumb to know how to stop a UPX decompress. It's compressed size was about 300KB, and uncompressed about 1MB - absolutely no need for the complexity and and overhead which in-place compression causes, especially for a dynamically linked run-time library. I checked all its import and export functions and nothing flagged as being inappropriate - like no wininet.dll imports. I also searched through the data for obvious IRC or FTP or WWW access and manually loading .dll's for live hooks (instead of declaring imports) - didn't see anything [obvious].

BUT, I know how an app can have full Internet access without accessing any libraries except shell32 - and that combined with a simple cypher to scramble text - could render passive detection useless. Sooo, I then did a Google search for known issues with sweetfx, specifically Trojan based, and didn't find anything to raise suspicion. That doesn't mean it's clean - that download link may not be a legitimate sweetfx release - but at this time I stopped checking as the odds were it was clean (although I was not going to use it myself!).

I did all this right after that post was made, but decided not to report on the result of my findings. But, if you want a culprit, that's my starting place. (MWB did skip it in a scan; don't let that think you are safe, MWB also skips all my toys too.) Just saying, if MWB picked it up, it was by its behavior, not by a viral signature - and if it blocked something coming off "KR", it would of been a pushed download from another site - meaning, you are already compromised - and most-likely by some unsigned app as sweetfx.
 #136705  by John
 
Ah man, Jaw pretty much already said what I was about to say. not really. I'm not that tech savy. : P
But yeah, what Jaw said.