Page 1 of 1

BLADE Malicious URL Analysis

Posted: Thu May 20, 2010 8:34 pm
by luntrus
Hi forum friends,

See the list: http://www.blade-defender.org/eval-lab/
example: 58d250aa7f4ba35217c7d285daf02949 2010-05-17 Eleonore Exploits pack v1.4.1 FF3 11/41 (26.83%) TR/Crypt.ZPACK.Gen Blocked MD hxxp://allnettraf.com/
allnettraf*com
Summary
•Computer Threats: 1

General Info: Web Site Location Ukraine

allnettraf*com
Threat Report

Total threats found: 1

Small-whitebg-red Virus

Threats found: 1
Here is a complete list:
Threat Name: Trojan.FakeAV!gen27
Location: htxp://allnettraf.com/ve5rf/load.php?spl=java_gsb&h=
Searching because the software isn't released yet:
You can search the list online.
I give an example here, where I entered the hxxp address into google for: hxxp://testforus.com/pdf.php which has: Trojan.Win32.SuspectCRC!IK
with the following search results
http://www.google.nl/#hl=nl&source=hp&q ... 0068b179f4
unmasked parasites: http://www.google.com/safebrowsing/diag ... tforus.com
http://www.freepcsecurity.co.uk/2010/04 ... -april-12/
Folks see why we cannot do without NS and RP in the Fx and flock browser


luntrus

Re: BLADE Malicious URL Analysis

Posted: Fri May 21, 2010 9:13 am
by Davezilla
Folks see why we cannot do without NS and RP in the Fx and flock browser

Dude...don't forget SeaMonkey! :lol: