Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Artemis!76B5C2A92AEC ?


  • Please log in to reply
3 replies to this topic

#1 GaryDee

GaryDee

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:56 PM

Posted 05 December 2014 - 02:43 PM

Hi.

Does someone know more: found this link @ bleepingcomputer

hxxp://screen317.spywareinfoforum.org/SecurityCheck.exe

https://www.virustotal.com/de/url/73e8b5fdde57965cc52e03e49902fd799ac0b04619f13ce5a1336a8313308862/analysis/

https://www.virustotal.com/de/file/03eb42ec04d9c360affad0015fa06343c85df48b74c01089fad708d34cec6a9b/analysis/

SEE:

http://www.bleepingcomputer.com/forums/t/507059/wormwin32vikingna-perhaps-more/

AND:

hxxp://screen317.changelog.fr/SecurityCheck.exe

https://www.virustotal.com/de/url/12aff916e90fc424bbfc237d6bde249c1679cfe398aa8ceaea0fa709f67ba64a/analysis/1417808383/

 

 

Regards



BC AdBot (Login to Remove)

 


#2 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:02:56 AM

Posted 05 December 2014 - 03:03 PM

If you are simply referring to the to the fact that Screen317 Security Check shows as "suspect" then this is correct.

 

Screen317 currently has no "Digital Signature" with it, as he is in the process of updating it.

 

Many of the tools used on all forums (from Screen317 Security Check up to ComboFix) will always show as "suspect", and this includes several other Antivirus or Antimalware tools. The reason is basically because they must "invade or investigate" inside an Operating System as a foreign entry.

 

This is never regarded as "unusual" and with some programs you will be asked to "Temporarily Disable your Antivirus" so the tool will run unhindered.

 

I hope this basically explains things for you.

   

NOTE - Malwarebytes  20141203

Screen317 is a developer and Moderator on Malwarebytes Forum
 

Thank you for your interest and care -


Edited by noknojon, 05 December 2014 - 03:13 PM.


#3 GaryDee

GaryDee
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:56 PM

Posted 05 December 2014 - 04:17 PM

Ok. So thanks :)



#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,140 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:56 PM

Posted 05 December 2014 - 08:05 PM

Expanding on what noknojon said.


Certain embedded files that are part of legitimate programs or specialized tools (like Security Check), may at times be detected by some anti-virus and anti-malware scanners as suspicious, a Risk Tool, Hacking Tool, Potentially Unwanted Program, a possible threat or even Malware (virus/trojan) when that is not the case. This occurs for a variety of reasons to include the tool's compiler, the files it uses, whether files are compressed or packed, what behavior (routines, scripts, etc) it performs, any registry strings it may contain and the type of security engine that was used during the scan. Other legitimate files which may be obfuscated, encrypted or password protected in order to conceal itself so they do not allow access for scanning but often trigger alerts by anti-virus software.

When flagged by an anti-virus or security scanner, it's because the program includes features, behavior or files that appear suspicious or which can potentially be used for malicious purposes. Compressed and packed files in particular are often flagged as suspicious by security software because they have difficulty reading what is inside them. These detections do not necessarily mean the file is malicious or a bad program. It means it has the potential for being misused by others or that it was simply detected as suspicious or a threat due to the security program's heuristic analysis engine which provides the ability to detect possible new variants of malware. Anti-virus scanners cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert you or even automatically remove them. In these cases the detection is a "false positive" and can be ignored.

Most of the well known specialized tools we use as malware fighters are written by known experts at various security forums like Bleeping Computer, TechSupport, GeeksToGo, SypwareInfo and other similar sites so they can be trusted...this includes any program hosted by BC for download. Unfortunately, many of these tools are repeatedly falsely detected by various anti-virus programs from time to time.

Rest assured our Security Colleagues are trustworthy and all the programs hosted for downloading here at BleepingComputer are malware-free and perfectly safe to use.

The problem is really with the anti-virus vendors who keep targeting these embedded files and NOT with the tools themselves. We can inform the developers but they have encountered this issue many times before and in most cases there isn't much they can do about it. Once the detection is reported to the anti-virus vendor, they are usually quick to fix it by releasing an updated definition database.

Artemis technology is the "Active Protection" component of McAfee's Security Center which uses a combination of signature and behavior analysis to check with McAfee servers in real-time to identify possible new malware threats. This is accomplished by adding heuristics to the virus database. McAfee then uses this heuristic detection to analyze the cataloged behaviors and assess the likelihood of possible new variants of malware before the vendor can get samples and update the program's definitions for detection. This process is similar to Symantec's Bloodhound Technology.

In general, heuristics uses non-specific detection methods to find new or unknown malware which allows the anti-virus to detect and stop if before doing any harm to your system. Heuristic scanning methods vary depending on the vendor. Some claim to allow emulation of the file's activities in a virtual sandbox. Others scan the file more intensively, searching line by line inspecting the code in a file to see if it contains virus-like characteristics. If the number of these characteristics/instructions exceeds a pre-defined threshold, the file is flagged as a possible virus. The disadvantage to using heuristics is that it is not as reliable as signature-based detection (blacklisting) and can potentially increase the chances that a non-malicious program is flagged as malicious. With heuristics, there is always a potential risk for a "false positive" when the heuristic analysis flags a file as suspicious or infected that contains no malware.

Artemis is not the name of an actual virus, but an alert displayed by McAfee when it thinks it may have found a new virus. Artemis is included in the detection name for any file that is quarantined or blocked by McAfee's Global Threat Intelligence (GTI) technology for enhanced detection of unknown threats based on the file's behavior. Thus, Artemis detections may or may not be malicious. McAfee advises to submit detected file samples directly to the Avert Lab's Threat Center if you think it was a false detection so they can investigate further and remove the detection if confirmed. To do this, please refer to:
* Submit a Sample To McAfee
* How to submit a possible false or incorrectly classified sample file to McAfee Labs
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users