| Page 1 of 1 |
Karmeck
Posts: 3371
Location: Sweden
|
Posted: Fri, 7th Nov 2025 14:17 Post subject: I downloaded the wrong file (a virus) wanna take a look? |
|
 |
Below file might include a virus.
https://drive.google.com/drive/folders/1fHboIc33SWDfdHGMRSrl8Iw6daiUQ4WC?usp=sharing
Was downloading updates for "The Outer Worlds 2". In my haste I forgot the ritual of going to the download site 5 times to get the actual download link. I did not know the size of the update. Enough excuses.
Running the setup, it closes chrome and then errors out.
Linked above is said archive, undoubtedly password protected to save it from scans. Password is in the archive itself.
Now, I don't know if this was the file, using the same password might finally caught up with me. Fixing that right now. But I still kinda wanna know.
I don't have a sandbox setup right now, so I share here in hope that someone want to take a look.
Archive is wired in other ways, includes a clip from a music video, I think.
What happened?, well, they tried to login to Facebook, was directly stooped.
Today my google account, also stooped right away.
Discord, sent out a bunch of crypto offers.
|
|
| Back to top |
|
 |
|
|
Posted: Fri, 7th Nov 2025 15:55 Post subject: |
|
 |
Why the fuck would i want to download a potential virus? 🤣🤣
|
|
| Back to top |
|
 |
Karmeck
Posts: 3371
Location: Sweden
|
Posted: Fri, 7th Nov 2025 16:19 Post subject: |
|
 |
| Stormwolf wrote: | | Why the fuck would i want to download a potential virus? 🤣🤣 |
For fun, finding out it does. Learn.
|
|
| Back to top |
|
 |
|
|
Posted: Fri, 7th Nov 2025 17:42 Post subject: |
|
 |
|
|
|
| Back to top |
|
 |
Frant
King's Bounty
Posts: 24876
Location: Your Mom
|
Posted: Fri, 7th Nov 2025 20:48 Post subject: |
|
 |
NOPE
Ph'nglui mglw'nafh Cthulhu R'lyeh wgah'nagl fhtagn!
|
|
| Back to top |
|
 |
|
|
|
| Back to top |
|
 |
|
|
Posted: Fri, 7th Nov 2025 21:37 Post subject: |
|
 |
Haven't seen a virus since 2008.
|
|
| Back to top |
|
 |
|
|
Posted: Sat, 8th Nov 2025 01:38 Post subject: |
|
 |
Try to upload it to virustotal.com then do some research from there
|
|
| Back to top |
|
 |
Karmeck
Posts: 3371
Location: Sweden
|
Posted: Sat, 8th Nov 2025 09:20 Post subject: |
|
 |
| Shocktrooper wrote: | | Try to upload it to virustotal.com then do some research from there |
Nothing.
Issue here is, as it's a setup file, it might be a small program that's acting, seemingly, legit, but with nefarius goals.
I literally used the exact same password on several sites though, might just be that.
Site did not find anything wrong with the setup.exe, but might be what it installs from all the other files.
|
|
| Back to top |
|
 |
Karmeck
Posts: 3371
Location: Sweden
|
Posted: Sat, 8th Nov 2025 09:35 Post subject: |
|
 |
| madmax17 wrote: | | Haven't seen a virus since 2008. |
Maybe not a virus, more like installing a program that steal your login tokens or.... Somthing.
|
|
| Back to top |
|
 |
|
|
|
| Back to top |
|
 |
Frant
King's Bounty
Posts: 24876
Location: Your Mom
|
Posted: Fri, 20th Mar 2026 05:18 Post subject: |
|
 |
Well, it seems to be malware after all.
| Quote: | 24/62 security vendors flagged this file as malicious
Popular threat label - trojan.midie/rugmi
Threat categories - trojan, downloader
Trojan-Downloader.Win32.Rugmi is a sophisticated malware loader that enables threat actors to install and execute various types of malicious software, including information stealers like Lumma Stealer, Vidar, RecordBreaker, and Rescoms. It operates by downloading and executing encrypted payloads, often using multiple components: a downloader, an internal loader, and an external file loader, making it highly adaptable and difficult to detect.
Once installed, Rugmi can:
Disable security software to evade detection.
Establish backdoors (e.g., on port 2627) for remote access.
Steal sensitive data, including credentials and system information.
Modify system settings, hijack DLLs, and persist across reboots via registry keys, startup folders, or scheduled tasks.
Use legitimate platforms like Discord’s CDN to distribute malicious files disguised as harmless downloads.
The malware has surged in detection, with hundreds of daily instances reported in late 2023 and early 2024, often spreading through:
Malvertising.
Fake software updates.
Cracked software (e.g., VLC, OpenAI ChatGPT).
Torrent sites and phishing emails. |
ps. if a rar/zip/etc. file is password protected Virustotal can't open it and thus it can't scan the files in the archive. not sure why the rar-file and the zip-file it contains were both password protected.
Ph'nglui mglw'nafh Cthulhu R'lyeh wgah'nagl fhtagn!
|
|
| Back to top |
|
 |
|
|
|
| Back to top |
|
 |
Frant
King's Bounty
Posts: 24876
Location: Your Mom
|
|
| Back to top |
|
 |
Karmeck
Posts: 3371
Location: Sweden
|
|
| Back to top |
|
 |
Frant
King's Bounty
Posts: 24876
Location: Your Mom
|
|
| Back to top |
|
 |
| Page 1 of 1 |
All times are GMT + 1 Hour |