Author Topic: identifying vector for bytefence/chromium malware  (Read 1177 times)

0 Members and 1 Guest are viewing this topic.

REDACTED

  • Guest
identifying vector for bytefence/chromium malware
« on: September 15, 2017, 12:19:32 AM »
I'm visiting my dad and he wanted to try some photo editing software for Windows. After installing (GIMP, XNview, Fotor, PhotoFiltre 7, Paint.net), the stupid bytefence/chromium malware popped up. I figure I clicked too quickly through the installer and installed it. I was able to clean the machine, but I'd like to know which one of these programs bundled stupid malware with their installer. Of course, it's possible it's none of them--I also visited https://pixlr.com/editor/, which has a suspicious flash page.

Anyway. I'm curious if there is anyway to check the installer files (or if anyone is familiar with that pixlr site). I don't have any way to run a virtual machine right now. Scans don't seem to pick anything up.

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37531
  • Not a avast user
Re: identifying vector for bytefence/chromium malware
« Reply #1 on: September 15, 2017, 12:28:51 AM »
Quote
Anyway. I'm curious if there is anyway to check the installer files
Yes there is,  www.virustotal.com  /  www.metadefender.com  /  www.jotti.org



REDACTED

  • Guest
Re: identifying vector for bytefence/chromium malware
« Reply #2 on: September 16, 2017, 11:45:25 AM »
Thanks. Turns out it was Fotor.