What's your favorite Tool for Malware Scanners??

OK here is the answer from Emsisoft as to the differences in how MBAE and Emsisoft work so once again now in order to have this coverage at Mbam you are up to $50 a year vs $40 as you need both there:

"For those of you who are unfamiliar with exploits, we put together the video below. Basically, these threats abuse vulnerabilities in everyday software applications such as browsers, office documents and PDFs and use these to download malware. Malwarebytes Anti-Exploit wraps these applications in three layers of defense, monitoring them for suspicious activity and stopping it at source.

I bolded the interesting line in the quote above. What MBAE does, is that it blocks vulnerability exploitation in software (the pro version monitors more applications than the free version). So, it interferes and interrupts exploitation before any download attempt is made. That is effective, but also means that, whatever malware is dropped differently (for example using a malicious email attachment) will be ignored, because that is not what MBAE monitors.

Our behavior blocker will not always detect the vulnerability exploitation, instead it will alert the user whenever actual malware or malicious activity is detected (to stick with the quote above, it will warn you whenever a malicious file is downloaded/dropped/executed as result of the exploitation).

This means that MBAE will block a bit earlier, but Emsisoft products will not allow the creation/execution of the actual malicious files and actions (payload of the exploit kit) on the computer and the results will be in both cases a clean machine. On top of that, contrary to MBAE, Emsisoft products monitor for this kind of activity, no matter if it originates from an exploited Java version, a malicious email attachment or a drive-by download."


I hope this clarifies things, if you have further questions, please let me know."
From Emsisoft Blog
 
Great Job Pete, that was a great comeback to a long thread. What are your feelings today about Mbam as I know I am one of a growing number who never bothers with it any more. And if you don'r use Hitman Pro for Ransomware, what do you recommend when encountering it as I don't know of anything else that can boot though the newer versions.
 
Hi Rich.

Nice info on the differences in how MBAE and Emsisoft work. :)

What are your feelings today about Mbam as I know I am one of a growing number who never bothers with it any more.
Like i've said before, it's a good general cleaning program especially if nothing has been run on the system.
Sometimes i see it remove quite a lot.

And if you don'r use Hitman Pro for Ransomware, what do you recommend when encountering it as I don't know of anything else that can boot though the newer versions
What do you mean when you say ....
I don't know of anything else that can boot though the newer versions
Most ransomware will allow the system to boot...... if it doesn't, you can't pay.
Or do you mean to remove the start files etc that the ransomware adds, so that the system can boot normally.
 
the ransomware I have seen allows no bootup, not even to Safe Mode so without HItman Pro, which allows you to boot into it in Windows using the kickstart I see no way to proceed except reinstall Windows.
Ok, so we're talking Mbr ransomware?
I personally haven't had to deal with this type, but there is a way to get the system to boot normally.
Not straight forward, but possible.

This is the shortened version................. ( you'll love this) :)
If the system won't boot into the recovery environment, you need to create a Recovery CD.
If one isn't to hand then one can be made from any system running the same operating system.
You also need to download FRST to a Usb stick.
Once the disc is created, the system can be booted to the recovery environment and 'Command Prompt' accessed.
There is a way for FRST to be run in this mode using the 'Command Prompt'.
When finished the reports will be added to the Usb stick.
From the reports a fix can be made that will remove any malware etc ( as we normally do )
The fix can then be run in the RE.
At the end of the fix we can add a Command to list the bcdedit contents.
From the bcdedit contents we can remove any altered identifiers with another fix.
The system should then be able to boot normally.

Like i say... i've never had to deal with this type of ransomware but the way to do it is known to us.

I admit that using the kickstart is probably a lot easier and quicker for you if you are out on the job and money is the governing factor.
But I'm just showing that it is possible without using the kickstart.
 
From what I have researched, Rich they allow you a given time to access your computer and pay up.
After the deadline you are in trouble.
Not with the Kickstart Dougie and BTW I have used it again after the 30 days on another pc I had done once before. Not quite sure how that is meant to work.
 
OK thanks for that I am glad to know there is another way Pete, that is actually encouraging and yes Kickstart is way quicker...but who knows if it will always work either.
 
I know I should have explained better Dougie. Booting to the Kickstart then mallows you to boot into Windows bypassing the MBR if that is the problem and then run Hitman Pro whether you have used it before or not so one could actually do that just to use it even when the MBR is not the problem. That is all I was saying.
 
One of my favorite discussions is Norton Av. One night on Linkedin Biz Forum I belong to we did a survey of those who ever used a Norton AV and I did use it years ago...."has anyone ever seen Norton Av remove anything" was the question. 137 responses all said the same thing and that was no one we knew has ever seen a Norton Av product remove anything.
I have never had Norton remove anything either but then again it has not had to as it has never let anything in in 5 years. It has blocked plenty of intrusions though and a few false positives as well. but nothing is perfect but if tweaked a bit works well.;)
 
Wait that counts...you have had Norton repel something? That definitely counts. In fact you are the first person I have ever known that saw Norton do anything but update. Do you happen to remember how many times and what it repelled. This is important!
 
Back
Top