PeaceMaker Threat Detection: detects advanced malware techniques

The it is a (-mode utility) designed to detect various methods commonly used by advanced forms of malware.

Compared to a simple , PeaceMaker targets the techniques that malware typically uses to "catch" it while it's running.

In addition, PeaceMaker is designed to provide incredible detail when detecting a malicious technique, allowing for more effective containment and response.

Specifications

  • See which code started a process (stack trace).
  • See what code loads one in a process (stack trace)
  • Detect uncharted (hidden) code through common Stack Walking features such as:
    • Creation process
    • Upload image
    • Creating threads
  • Detect remote thread creation.
  • Detect parental process identity forgery.
  • Detect threats in unmatched (hidden) code.
  • Block basic breach functions in the GUI client.
  • Block file / registry system, record, delete, or perform operations that violate a user-defined filter.
  • Detect file / registry, write, delete, or perform functions that violate a user-defined filter.
    • Records the source process and stack of operation.
  • Filter for known false positives.

Remarkable properties

  • Meticulous analysis of the code.
  • All crawling routines are in the kernel driver.
  • Designed to detect user-mode malware.
  • Tested using Driver Verifier standard configuration
  • Tried putting it on my daily laptop and watching for problems (nothing happened).

Information on installing and using the program, you will find here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).