BurpBountyPro v2.5.0
by - Thursday, January 1, 1970 at 12:00 AM
Scanning a 7Z archive: in order to prove the users safety;
associated the included executable hasn't any sense at all.
The result is always a FUD archive; or rarely very few Heuristic,
Anti-Malware(s) approximation of the Malware detected, inside.

So, given the latter reason: unlocked data has been analyzed.
Java | JAR file has been tested over raw VT engine: resulting clean.
The folders - /profiles/ - and - /rules/ - contains several code source instructions,
which stand used from the BIN shared above: during the integration annexed in the;
Burp Suite - Security Assessment applicative. Despite their appearance, the quantitative is wide;
so, I didn't see them; or looking to go forward further. It's not my share, and then; be careful before
executing the extension. At least, until you wanna be sure of the weird Malware activity: I didn't write.

Evidence MD5: 255951c8b229dd1ef916dd90a5776c0b
Evidence SHA-256d7381aac54239a4f077a0907712ce726f49b0c53cf0098814bc101cba3f52064
Evidence URL: https://www.virustotal.com/gui/file/d7381aac54239a4f077a0907712ce726f49b0c53cf0098814bc101cba3f52064/detection
Evidence QUK: https://virusscan.jotti.org/en-US/filescanjob/xkf0lbfdfy
Heuristics: https://metadefender.opswat.com/ | https://www.joesandbox.com/
Reply
thanks for sharing
Reply
Thanks for sharing!
Reply
thanks for sharing
Reply
thaaanks man I really appreciate it
Reply
:000 very useful, thx!! :D
Reply
Could you can share profile and rules.

Thank you.
Reply
If the /profiles/ and /rules/ folders have unlocked permission to access the files in, it's enough to scan the 7Z archive.
It all depends from its permissions level, which in the first case: I didn't checked the state, but were locked folders; at least.
Could be easily my fault, despite the attempt was looking just to help the community users; about around a sort of sense.
Reply
thanks bro
Reply
This is awesome
Reply


 Users viewing this thread: BurpBountyPro v2.5.0: No users currently viewing.