• 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Per-version report - GetOverX Shield Server 3.0.2.0
#1
Tested version: GetOverX Shield Server 3.0.2.0
Installer SHA-256 hash: [550e7b347f6011bb9d6a35c59382412b5bde7c3454549c24110a225c3cf4ad46]

1. Multi-AV result (VirusTotal)
- Engines: [update with engine count]
- Result: [1 / 71]
- Isolated detection(s), if any:
  - Vendor: ESET – Win64/WinDivert.A Potentially Unsafe
  - Reason: Server edition also uses low-level drivers and network inspection modules that some vendors classify as “potentially unsafe applications” by policy, especially on servers.

2. Behaviour summary in sandbox (MITRE ATT&CK)
When the Server installer was executed in a sandbox environment, the following categories were observed:
- Execution: service installation and use of native Windows Server APIs.
- Persistence / Privilege Escalation: creation of Windows services set to start at boot, modification of relevant registry keys.
- Defense Evasion: protected components, code packing and controlled injection into own processes for monitoring.
- Discovery: system, role and process discovery typical for a server protection agent (services, listening ports, installed roles/features).

No malicious server-side behaviours were observed:
- No unauthorised modification of business data.
- No tampering with domain controllers, AD objects or database services.
- No exfiltration of server data to unknown external endpoints.

3. Lab tests (summary)
- Installation and removal on clean Windows Server virtual machines (2016/2019/2022).
- Verified:
  - Service stability under load.
  - Interaction with typical server roles (file server, web server, domain member).
  - Logging and remote management from the console.

Conclusion:
The tested Server build behaves as expected for an endpoint protection agent on Windows Server:
- External AV engines do not report classic malware; any isolated detection is related to the presence of powerful administration/security components.
- Behavioural analysis shows service deployment, monitoring and hardening activities, without backdoor or ransomware-like patterns.
Link Test:
https://www.virustotal.com/gui/file/550e...5c3cf4ad46
  Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)