Page 1 of 1
Beware of Malware created with PB
Posted: Sun Jul 23, 2017 10:14 am
by walbus
From time to time, it is quite surprising to see here people who want to create malware with PB, please open your eyes !
A much bigger damage can hardly be inflicted on PB
Re: Beware of Malware created with PB
Posted: Sun Jul 23, 2017 6:07 pm
by CELTIC88

i don't think that because pb is compiled to native language

,.....
Re: Beware of Malware created with PB
Posted: Sun Jul 23, 2017 6:33 pm
by walbus
You think or you know ?
Or you think you know ?

Re: Beware of Malware created with PB
Posted: Sun Jul 23, 2017 6:37 pm
by CELTIC88
Now I'm sure, No
pb translate code to asm code

Re: Beware of Malware created with PB
Posted: Sun Jul 23, 2017 6:55 pm
by Lunasole
Meaningless. Any tool/language can be used to code yet-another cryptolocker and nothing to do with that.
The problem is rather with some stupid AV vendors, putting language-specific signatures to their bases (instead of program-specific).
Re: Beware of Malware created with PB
Posted: Sun Jul 23, 2017 7:06 pm
by walbus
A good answer Lunasole !
Of course it is possible and simple to code many malware with PB
Re: Beware of Malware created with PB
Posted: Tue Jul 25, 2017 8:36 am
by Kwai chang caine
It's unfortunately the bad side of the power, low level, small and portable (Without dependancies) of pb.

It's not always good persons who need all this advantages in the same language...
Re: Beware of Malware created with PB
Posted: Tue Jul 25, 2017 3:07 pm
by walbus
Yep KCC,
so it's very important we give this persons or late puberty boys absolutely not support for coding here.........
Re: Beware of Malware created with PB
Posted: Tue Jul 25, 2017 7:43 pm
by Kwai chang caine
Re: Beware of Malware created with PB
Posted: Wed Aug 02, 2017 8:26 pm
by tj1010
PB creates PE, ELF, and MACH binaries with no runtime requirements, and API support.. Of course people use it for malware.. People actually use .NET and Java more for userland binaries and then something low level for the driver rootkit.
Competent anti-virus researchers will extract unique stubs for their signatures.
Re: Beware of Malware created with PB
Posted: Wed Aug 02, 2017 10:13 pm
by nco2k
few years ago, there was a thread about how to identify a purebasic exe. sadly there is a lot of malware written in purebasic. the anti virus software checks if its a purebasic exe and flags it as potential malware. they dont even go deeper to see if it actually could do damage. they simply flag everything that is written with purebasic. it sucks and hurts all of us. but there is not much you can do about it, except sending the exe to your anti virus manufacturer and demand a fix.
c ya,
nco2k
Re: Beware of Malware created with PB
Posted: Wed Aug 02, 2017 10:42 pm
by Dude
nco2k wrote:the anti virus software checks if its a purebasic exe and flags it as potential malware
A lot of internal PureBasic code has "PB_" as a prefix, which I assume gets into the final exe, and could be the identifier that you speak of. Maybe if PureBasic could allow us to set a custom prefix string (such as "MyCompanyName_") then the exe wouldn't be recognized as a PureBasic app? Or maybe we can do it ourselves by modifying the assembly output before manually re-compiling it. Thoughts if that would work?
Re: Beware of Malware created with PB
Posted: Sun Aug 06, 2017 5:20 am
by tj1010
Anti-virus engines never use PE headers or reloc data or symbol tables. They use code section only. If a researcher gets a EXE or DLL made in PB they look for a unique stub and put the bytes in their database. Nothing else.
If it has an advanced protector/obfuscation on it they get the unique compression block or VM byte code stub and add that. Warez cracks and such get flagged because reused patching code or behavioral analysis.
I have seen stubs from cracked VMProtect and TheMida and PEProtect builds get entered before because they were used on malware. This was the case of poor quality researchers though and the entries eventually got pulled.