Hey all you may want to try VirusTotal for sites like that. I have the enterprise version so if you want I can get all the info. I’ll post link after I analyze.
@Hax0rgurl#164462 well it’s a bit confusing. I don’t see the popup URL
@hector100#164294 even if it’s down, I need the exact IP or URL of the popup. The techloris landing page is somewhat fine and would not count as proper evidence for them conducting deceptive behavior.
@NeeP#164488 ok just ask me about what is confusing and I will try to explain. I understand it looks like a mess of files but that’s all their connections and redirects. The ones in red are all malicious. I am going to see if I can do a YARA search for a pop up specifically and get back to you.
About proving they are conducting malicious activity, please show them that graph. There is no denying that they are sending malware and phishing links to unsuspecting people that land on their pages.
@NeeP#164488 hold on I’m confused, isn’t .php the way you make popups? The address is
https://techloris.com/lp/de/error1.php am I confusing something? That address pops up as suspicious, it’s the one in the middle of the graph. That is the address that links to a ton of malicious files. If you follow the arrow from that file, to the others, you will see that’s the bad file and it says error like Hector mentioned. So I believe that’s the right address. Now, I have no way of seeing if that is the specific pop up and I’m working off an ipad, so if any of you have a VM set up, maybe you can go on the site and make sure. Maybe it’s error.php or error2? Just throwing out ideas.
@Hax0rgurl#164496 The https://techloris.com/lp/de/error1.php is just the landing page. It means from wherever you come from, probably a popup, you land there. I don’t think the site itself is malicious. It doesn’t look super nice but it’s not deceptive or illegal. Like it does not make false claims or pretend to be Microsoft. Hence no problem with that so far.
As per the Virustotal graph with the “malicious” files: the files are not malicious. They are detected by 1 out of 59 AVs and the only detection is by “Babable”, an AV I’ve never heard of before and it only classifies the file as PUP which isn’t malicious (enough).
As per the URLs / websites on that 104.26.5.188 IP address, these are just websites hosted on the same web server. I don’t think there’s a real connection between that landing page and these websites.
So sadly this isn't enough to prove malicious activity. I would need a screenshot or link of the popup itself. Or a real infected file. :/
@Hax0rgurl#164503 I don’t see why these should malicious Did you find a virus there or why do you think that they’re malicious? If you go to these links, e.g. the error9.php, it’s basically the same site as error1.php but it has a different title: “how to fix windows NA errors”. These are just the landing pages. But it’s not malicious, there’s no virus on it or the page doesn’t pretend to be Microsoft or something.
The only thing that I find deceptive or at least borderline is that it claims "Restoro is highly recommended to repair Windows 10 errors" which is bs. Microsoft does not recommend this software. So this could be something they fked up :P
[IMG]https://i.imgur.com/1khBoG5.png[/IMG]
We'd need the popup message which claims something like "Warning! Your PC has 5 Viruses" which was probably what @hector100#164489 was talking about that his uncle had on the computer.
Btw I'm using the AppEsteem certification checklist (https://customer.appesteem.com/home/checklist) and the deceptor checklist (https://customer.appesteem.com/home/checklist?minbar=y) to determine if something is bad or good. They've made a pretty good checklist of what is considered deceptive and what is considered acceptable. If we find something that is violating these rules, I can submit it to AppEsteem, they'll blacklist the software and since a lot of AVs are listening to them, the whole software gets detected as PUP or virus idk on **all** AVs.
@NeeP#164513 hi some of them have pages that download things in the background and call back to other IPS did you check my graphs? I found EXEs on there I think that restoro was one. If you can go on the site then you need to check the back end of the code. I mean sure any site at first glance can look okay but they can be sending you a malicious javascript that quietly installs a remote caller on your system without you even seeing it happen. My computer is fried from a virus so I’m unfortunately not able to VM at the moment and I don’t trust any of those sites. Maybe I should do a screen video of virus total as it’s creating the graph so you understand all the files just landing on one page calls or downloads.
I’m not sure their level of malware sophistication but even script kiddie shit these days is getting complicated. Did you know for example STUXNET is on github? Yeah. Anyone cam go and use it and change the code to their needs. So intelligence isn’t needed for good coding anymore. You can just steal code.
@Hax0rgurl#164554 callbacks to other IPs are no problem. If you check the graph, it even goes to real Microsoft. Yes, EXEs are Restoro which makes sense because the landing page is a Restoro website, advertising the download of Restoro/ReImage (which is the same? idk). I didn’t check for any malicious javascript but if we haven’t found anything, we can’t claim one is there. Innocent until proven guilty.
The malicious EXEs are all Restoro/ReImage and usually they’re detected as PUP which means they’re not true malware. I think it needs a close examination of ReImage and Restoro according to the AppEsteem certification guidelines.