r/Malware

New GMKtec M7 Ultra appears to be infected. Beware of the malware!
▲ 148 r/Malware+1 crossposts

New GMKtec M7 Ultra appears to be infected. Beware of the malware!

I have a feeling that this is not good. Also, trojan.FakeGoogle was detected. And some others as well. This is about 1h after I unboxed it and tried to do windows updates (terrible wifi as well, RZ616). Probably should return it to Amazon...

Edit: I get that I should do the USB reinstall of the OS. But it's a brand new machine for EUR 620 that others will buy who will never go on reddit or install anything to check for malware. It should be clean. I'd Linux it if I had the time (there will be other users of the basic media machine who might be confused so I want Win11).

And thank you all for the sound advice and being mostly polite. Have a great day! :D I'm returning it out of principle.

Edit 2:

I thought this was a friendly community. It is not. I'm sorry for posting and warning anyone else.

Thanks all, it really was (a few were nice, thank you) a terrible experience. I don't know how I hurt all of those who were so mean. Have a nice day.

u/2_I_Snake — 2 days ago
▲ 3 r/Malware+1 crossposts

Can't access anything

I have accidentally downloaded a virus called "pc app store" and it won't disappear after closing. It also hides all other apps and won't let me click anything.
Don’t know how to fix this, I know very little about computers.

reddit.com
u/Chunder_Struck — 2 days ago

Malware learning

Hi guys, I am new to like cyber security related stuffs, I wanna learn about malware analysis in both offensive and defensive way so is there any free resources available so I can learn that.

reddit.com
u/Ok-Entertainment1587 — 4 days ago
▲ 13 r/Malware

Netmirror exposed - The Free Movie App That Was Robbing You Blind

Came across this really interesting analysis of a pirated Android movie streaming APK called NetMirror and honestly didn’t expect it to go this deep.

At first glance the app looked completely normal:
clean UI, React Native based, movies streamed properly.

But the analysis found:

  • emulator/sandbox detection for Genymotion, Nox, BlueStacks, VirtualBox, etc.
  • Base64-encoded infrastructure domains hidden inside the Hermes JS bundle
  • staged permission handling for SMS and call log access
  • WebView credential interception hooks
  • native libraries containing the same tracking infrastructure references

The most interesting part was how it bypassed automated analysis.

Hybrid Analysis apparently marked it as “safe” because most of the suspicious logic wasn’t in the Java layer scanners usually inspect — it was hidden inside the React Native Hermes bundle and native libraries.

Pretty solid example of how modern Android malware is starting to exploit analysis blind spots in cross-platform frameworks.

Worth the read:
https://medium.com/@Espress0/the-free-movie-app-that-was-robbing-you-blind-eeefe9c5e65c

greatly broken down and presented

reddit.com
u/Alarmed-System6242 — 4 days ago
▲ 33 r/Malware+3 crossposts

Brovan: Binary user-mode emulator for x86_64

After months of work, I’m excited to finally share Brovan, my user-mode binary emulator.

Brovan can emulate:

* PE binaries
* ELF binaries
* Memory dumps
* Even partially unknown or unrecognized binaries

The goal is to make binary analysis, malware analysis and general binary research more flexible by giving full control over execution, memory, and runtime behavior in a contained environment.

Building this involved a lot of work around emulation, syscall handling, memory management, binary loading and parsing, and there’s still much more to improve, but it’s finally at a stage where I’m happy to share it.

u/AhmedMinegames — 6 days ago
▲ 1.1k r/Malware+4 crossposts

Mass npm Supply Chain Attack Hits TanStack, Mistral AI, and 170+ Packages

massive campaign for 170+ packages and 400+ malicious versions published. what we saw that not a single maintainer account compromised. tanStack and Mistral AI these are the names that stand out.

safedep.io
u/BattleRemote3157 — 10 days ago
▲ 133 r/Malware+10 crossposts

Mini Shai-Hulud worm hits npm supply chain, compromising 160+ packages via GitHub Actions cache poisoning

Mini Shai-Hulud has yet again reportedly compromised 160+ packages, including parts of the TanStack and Mistral ecosystems. The interesting part is the attack path: instead of simple typosquatting, it abused GitHub Actions cache poisoning and trusted publishing/OIDC workflows, making the malicious packages appear legitimately built and published.

thecybersecguru.com
u/raptorhunter22 — 9 days ago

Inspecting a DLL file trying to figure out if it really is malware

Virus Total : https://www.virustotal.com/gui/file/4a7063b95d7278f4002e3ef74606f429c5a69ddb2de6e60cdf12234004d23e38/detection

Kapersky : https://opentip.kaspersky.com/4A7063B95D7278F4002E3EF74606F429C5A69DDB2DE6E60CDF12234004D23E38/results?tab=upload

Hybrid Analysis : https://hybrid-analysis.com/sample/4a7063b95d7278f4002e3ef74606f429c5a69ddb2de6e60cdf12234004d23e38

This is the Github where it was downloaded from : https[:]//github[.]com/YimMenu/YimMenuV2

My reasoning for why it may not be a virus:

It is a modification for a game, and with that I expect a couple false positives minimum, but I've also checked plenty of sources (such as the ones listed above) and the community around this mod.

Any constructive advice or info is appreciated

I don't think I'm asking for technical support, just second opinions on this, or possibly some tools I can use to better analyze the file.

reddit.com
u/Cortex_Gaming — 7 days ago

Granny’s Compromised Android Firmware

So my grandma one day tells me she has had problems accessing WhatsApp. All my cousins had tried to fix it for her but nobody could, and since I’m the most tech-savvy she asked me for help.

When I first inspected it, it said the WhatsApp app she had wasn’t authentic, and to please download the real one; so I went to the Play Store and downloaded the real one, but the same message came up. At this point I believed it was a problem with the Play Protect Certification but the more I dug in the weirder it got.

The phone is clearly a Samsung Galaxy clone, but the updater version had some cursed name like “S24_ULTRA_2”. CPU-Z claimed it had a Snapdragon 8 Gen 3 running at like 1.3GHz 🤣 and the board info showed “alps / k53v1_bsp_gmo_1g”, which apparently is a MediaTek clone board.

At this point I decided to gift her a new phone and SIM card since even the SIM was flagged apparently by WhatsApp.

But I was/am still curious about this device so I decided to investigate more, but with Chat GPT’s help since this is a little too advanced for me. It told me to install PCAPdroid to monitor network traffic and that’s where things got interesting.

The phone was making DNS requests to completely random gibberish domains like:

- kbueeltmvihu

- dbcfakhafb

- pdtosgijvvqky

At the same time it was also contacting normal Google services like:

- play.googleapis.com

- mtalk.google.com

- Firebase logging endpoints

The weird part was that PCAPdroid labeled the suspicious DNS requests as coming from “Root,” not from a normal installed app.

From there I started reading about about preinstalled firmware malware and counterfeit Android ROMs with baked-in spyware.

My current theory is that this isn’t just a sketchy APK I installed, the malware is probably embedded directly into the system firmware itself, which apparently is pretty common in ultra-cheap clone phones.

These days I’ve had the phone in quarantine but its a perfectly usable device and wouldn’t want to just throw it away, so my questions are:

1- What conclusions would you draw from this? Has this happened to you before or someone you know?

2- Can this be fixed? Can I flash another firmware onto the phone and go on with my day?

3- LLM’s had highly suggested to not connect it to my WiFi network because the malware could mayyyyybe do a sideways movement, and I’m not confortable connecting it to my PC so what are my options? Are these things really that unsafe?

4- If the phone is fully compromised and unsaveable, what can I do with it? I was thinking of using it as a virus pandora box or to download pirate files without the fear of infection and then safely move them to other devices.

reddit.com
u/Outrageous_Place6913 — 8 days ago
▲ 4 r/Malware+1 crossposts

Fake linked in sponsored google search

I was doing like three different things at once, and typed in LinkedIn trying to verify. And without thinking (Stupid ik), I went through this weird verification process I thought was new on the fake website. It was the top search, so I clicked without thinking, as I thought it was the right one. It made me enter something with a command prompt. Does anyone know what happened? I scanned my device, and they found nothing wrong.

Dont think I can post the site here but if anyone can help, that would be great.

reddit.com
u/Tempexd — 10 days ago
▲ 92 r/Malware+3 crossposts

JDownloader is compromised!

JDownloader is compromised!

  • The replaced malicious executable contains the official and benign JDownloader in resources along with an XOR encrypted blob also available in resources
  • The encrypted blob after 8 minutes of waiting to prevent sandbox noise is decrypted and executed, the next stage contains also several XOR encrypted resources and the official Python installer
  • After decrypting resources, they contain PyArmor encrypted file and PyArmor runtime
  • Delivers sophisticated Python remote access malware

See AnyRun execution chain along with the 8 minute wait before the payload starts: https://app.any.run/tasks/e0cecc2d-5571-49fe-a549-cc7d1b8b5908

IOC's:

  • Initial delivered installer -> 5a6636ce490789d7f26aaa86e50bd65c7330f8e6a7c32418740c1d009fb12ef3
  • Stage 2 payload -> 77a60b5c443f011dc67ace877f5b2ad7773501f3d82481db7f4a5238cf895f80
  • PyArmor encrypted blob: 5fdbee7aa7ba6a5026855a35a9fe075967341017d3cb932e736a12dd00ed590a
  • hxxps://parkspringshotel[.]com/m/Lu6aeloo.php (most likely another compromised URL)
  • hxxpx://auraguest[.]lk/m/douV2quu.php (most likely another compromised URL)
u/rifteyy_ — 13 days ago

looking for "evil" Websites

i am currently doing a Website analysis for college

and thought it would be more interessting to look at a Website with lots of malware and such.

any idea how to find them.

PS: If anybody has a link for me feel free to dm me.

reddit.com
u/Geraldenyo — 10 days ago
▲ 14 r/Malware+1 crossposts

Wtf OPEN Ai

Restarted my Mac mini m4 because the image preview froze. Thought it was a bit odd, but after booting back up I get this message. What were you hiding in that app Open Ai?

Anyone else get this??

u/Rebel_Romeo — 12 days ago

sl1nk link

hey I recently found a "Sl1nk" link on a certain TikTok video, and me being curious I put it into virustotal to see if it's safe or not (the results showed in the image attached). I'm making a post to get more information about this because when I looked it up there wasn't much information about it apart from another malware report, more links like this and some wikipedia hacker group article. Would anyone here know what it possibly could be?

u/LitreallyNoOne — 11 days ago