The Steam forums have been however very active lately about this issue, the main issue was that Capcom pushed this onto consumers with no warnings on old games, and to make matters worse, the company that made "The Enigma Protector" is sketchy as the company supposedly doesn't exist.
Now the issue why people are very paranoid about this is that there's this exe file which had the Enigma Protector and it triggered several AV engines including Malwarebytes, I however can't figure out if its tied to Capcom but it was brought up multiple times in the forums.
This could also very well just be blown out of proportion, but I unfortunately lack the skills to do a thorough investigation myself on this matter, what triggered this news to spread was when Capcom tried to implement this in Resident Evil Revelations but screwed up and made people notice. They have reverted the update for this game, however it is still in the other games.
Please reference the following on how to provide sample submissions such that Malwarebytes' Anti-Malware (MBAM) can detect targeted but presently undetected new threats in the form of disk files.
I'm not an employee of malwarebytes, but I've been exposed to and know about Enigma Protector, so I may be able to be of some help to you.
Enigma Protector is pretty much the same as VMProtect/Themida/Safengine (also known as NoobyProtect), an encryption protection and anti-debugging shell for software.
I don't have access to download the attachments from the Malwarebytes forum, but thanks for the VT link, I can get them from VT using the API.
The first two of the three files you provided are from CAPCOM, no problem, but the third is obviously not from CAPCOM.
It uses a trial version rather than an official version of Enigma Protector, and it's also not digitally signed by CAPCOM, and even more disastrously I can't debug and analyze it because of the presence of Enigma Protector.
It's true that these protectors affect analysis and detection by security software, but I don't think that just because they add encryption/virtualization protection that it's harmful.
Yeah fair enough, wasn't really sure if this would be the right place to post this or not as its speculations, I usually don't mind DRM or packers myself but it did make me a bit anxious that it seemed rather obscure and the whole fearmongering happening in the steam forums. Just wish that someone could put a proper end to the discussion if this is really harmful or not.
All viruses are malware but not all malware are viruses. There is a taxonomy to malware and malware is a portmanteau of MALicious softWARE. Malware consists of all trojans, viruses and exploit code. Just like when it comes to cars; All Fords are automobiles but not all automobiles are Fords. And just like there are no Ford Chryslers, there are no trojan viruses.
So games are often used alongside malware. Unlike a virus which spread autonomously, a trojan needs assistance. Social Engineering (the Human Exploit) and Software Exploits are often used to get the malicious software into your enclave, your computer. Today we are seeing many fake Game Sites being setup offering Free Beta versions of some "game." Using Social Engineering exploiting the gamers' "desire", people go to these sites and download what is malicious software, where the installer is often hosted on Discord's CDN (Content Delivery Network). Another way is to take a legitimate Game Installer Package and wrap another installer around it that will also install malware.
They see information about submitting a file or files to Virus Total where the file(s) can be scanned by a multitude of participating anti malware vendors, which includes the Windows Malwarebytes (Virus Total version) Engine and Signature set.
In the old days when Virus Total was owned by Hspasec Sistemas, the name of the malware was quite indicative to the type of malware and the family it may be a part of. There was a fairly well adopted convention to the naming of malware detections. However Today that is not the case. Thousands upon Thousands of new trojans are introduced daily and it just isn't viable to have a specific naming convention. Anti malware vendors believe what is most important is that the malware is detected and removed, regardless of the name. Additionally each anti malware vendor has their own naming convention for heuristic detections. These are not based upon a particular signature or fingerprint but by a loose analogy logic of "If it walks like a Duck and squawks like a Duck, then it must be a Duck". But that also leads to false detections which are known as False Positive defections.
If I have a given malware file (binary) and release it Today, it may not be detected. However Heuristics may catch some new files. As time goes by and the given malware binary is in-the-wild it will start to be signature detected and it will be shared and the number of anti malware vendors detections will ultimately rise. In many cases this could be in hours but mostly in days.
That's where packers and cryptors come into play. These software utilities allow that malware to run and work as intended but the binary is completely altered. All signatures that may have been reliably been detecting the binary will no longer detect it and thus the game of detections starts all over again.
So that's where he paradox comes in where malicious actors use the software to make their detected malware less or undetected while legitimate software vendors use the software to protect their Intellectual Property.
A true malware file represented on Virus Total will see a large number of detections of mostly signature based detections and not of heuristic detections. If a file has been known to virus Total for months and has a very low number of defections then the file's detections may be only heuristic detections, False Positives or when it comes to Potentially Unwanted Applications/Programs (PUA/PUP) the file could be a case where a vendor's stance of what makes a PUA/PUP detection is based upon their criteria for the decision. For example the criteria for a PUP detection by Eset may not meet the criteria of Malwarebytes.
** Now you, the consumer of said Capcom game(s), should contact the author, and ask if they are to use the Enigma Protector to protect their intellectual property rights, why they don't Digitally Sign their files to avoid such detections and the ensuing confusion.
There is not any kind of viruses in protected files but BD still detects it. Can you please eliminate this problem asap! Just a lot of customers use Enigma for software protection and they are really cruel about BD problem!
Live chat is quicker then email support. You can find it here. Choose technical support.That depends if you have a local support address or not. If it is support at bitdefender dot com that is the worldwide support address for countries who don't have local support.
I'm understand that it is only "packer" detection, BUT, Bitdefender alert on protected files similar with the virus files! I tried to scan protected files on and ONLY BD alert on virus present. Other antiviruses just check protection and give quiet results, but BD says that the file should be deleted/moved/other... how can I expain to users that it is only packer and not a virus?
I can't give you an answer why BitDefender doesn't react on all packers. My opinion is that they (Softwin) didn't add these signatures or they know that they are safe. You have to wait till one of the virus researchers replies. To receive a correct answer.
I submitted a file protected with CodeArmor ( ) and saw no problems. I suspect Enigmaa protection process has modified the PE file in way that similar to Virus/trojan. You should do a static compare with CFF explorer and determine the differences
If it is possible to contact BD developers, just say them to contact to Enigma support team at sup...@enigmaprotector.com The Enigma developers made few features for antivirus companies for easier detection viruses in protected files.
Hello Florin, ok, please, give me email address of your researchers and I will send it to Enigma developers, they will give you all information about secure features!! or contact to sup...@enigmaprotector.com
There are many questions from our customers on how to protect .NET applications against cracking and dumping. In this article we will try to describe all the weak moments and details in protection of such specific files.
At this step we can compile the project to .exe file and simply protect with Enigma Protector. Protected file will work well, but it is usually not enough to protect the application from being reverse engineered by advanced cracker.
Now we are able to use Enigma API functions. To extract protected strings from protection we need to call the function EP_ProtectedStringByIDAsWideString/EP_ProtectedStringByKeyAsWideString which both are wrappers of native EP_ProtectedStringByID/EP_ProtectedStringByKey functions.
Note, above we added string with the option Wide String in Enigma Protector. If we specify the option as Ansi String, then we have to use functions
EP_ProtectedStringByIDAsAnsiString/EP_ProtectedStringByKeyAsAnsiString in the application code.
ID or Key parameters should be taken from Enigma Protector. These parameters are unique for each string and protection applies it automatically for new added string, however they can be changed by custom value manually too.
Now we need to protect this dll file. Open Enigma Protector, select the file nativelib.dll to protect and protect it. Check the protection log, protector has to find 3 pairs of markers. Also, make sure there is no warnings or errors related to markers. Finally we have to get nativedll_protected.dll file.
We may also change the virtualization method for selected functions from RISC VM to Classic VM. RISC VM is very complex to reverse, but it is also slow and heavy. Classic VM is more easy to reverse, but it is small and fast. Depending on requirements select necessary virtual machine to apply.
b1e95dc632