SephStorm wrote: » Specifically I need to know how to detect when a piece of software is doing something malicious
SephStorm wrote: » FYI, I am aware of tripwire, can someone tell me is it free? Is there a free windows version?
YFZblu wrote: » Regardless of Cryptolocker being relatively new when compared to Zbot and ZeroAccess, it's still commodity malware that has been observed in the wild for five months. There is no excuse for any self-respecting A/V vendor to lack signatures for it. If the binaries you're looking at were not detectable, it's likely due to obfuscation techniques and not because Crypolocker is an unknown or too new. My understanding is that Cryptolocker is written in .net which is especially good about revealing its makeup during code analysis.
NovaHax wrote: » I personally didn't test it against any AV products. Just basing my claims off of virus total. Cryptolocker has had several new versions/signatures since it was originally detected in the wild. The latest version available from GRC is currently being detected by 35 out of 51 on virus total. When ran less than a month ago (Jan 22), only was detected by only 6 out of 51.
YFZblu wrote: » but because malware authors make a living off of employing clever changes to their software.
JDMurray wrote: » ...and testing the stealthiness of their changes using pubic services, like VirusTotal.
NovaHax wrote: » I just run malware in a VM and run some various tools for traffic analysis, registry analysis, file system changes, memory ****, etc...