30
submitted 15 hours ago* (last edited 11 hours ago) by Yourname942@lemmy.dbzer0.com to c/piracy@lemmy.dbzer0.com

How do you validate that what you torrented is clean/no malware/spyware? Specifically, I torrented two things:

  • Astute Graphics Plug-ins Elite Bundle 3.9.1.7z from teamos. *It is 678MB so I can't upload to Virustotal
  • Master Collection 2025 from uztracker (which is listed on monkrus's website's list of trackers). It is 37.5GB so I can't upload to Virustotal.

I'm not sure what I should to do to be honest.

Edit: Would splitting the 37.5GB file into 650MB pieces and then scanning with virustotal help? Not sure if downloaded files need to be whole for it to work properly.

This is the results from virustotal (I could only scan 4 files in the master collection without running the iso)

Thank you.

top 33 comments
sorted by: hot top controversial new old
[-] fastfomo7@lemmy.dbzer0.com 3 points 1 hour ago

Honestly, the safest move is to keep these files totally separate from your personal stuff. Running them in a VM or dedicated hardware is really the only way to avoid getting hacked.

[-] MantisToboggon@lazysoci.al 24 points 14 hours ago
[-] DemBoSain@midwest.social 11 points 14 hours ago

You again? GET OUT OF MY CAR!

[-] pirateKaiser@sh.itjust.works 9 points 12 hours ago

Run it inside a VM? If you're suspicious or just worried, this would resolve most if not all of possible worries you may have.

[-] USSEthernet@startrek.website 6 points 10 hours ago* (last edited 9 hours ago)

This is what I do. I have a VM for torrents and a VM sandbox to check stuff that I'm concerned about. At the host level I disable any type of sharing with the host, no copy paste, no sharing disks, nothing. The VM only gets the storage I assign to it and once I validate then I'll detach and mount it to the host.

[-] Yourname942@lemmy.dbzer0.com 1 points 10 hours ago

Hey thank you for the info. Which VM do you use? How do you disable the various types of sharing with the host? Also, how do you validate? Sorry for all the questions, but that seems like it may be my only option

[-] USSEthernet@startrek.website 2 points 9 hours ago* (last edited 9 hours ago)

I use Hyper-V because I run server 2022 and it's free. Hyper-V allows you to disable any host resource sharing in the VM settings.

On my sandbox VM I'll scan the files then install and scan, then run the software and scan. I use both defender and I think malwarebytes. It's a lot of extra work for no gain, but I'd rather be too careful than risk installing malware.

[-] Yourname942@lemmy.dbzer0.com 1 points 9 hours ago

Thank you for the detailed response. Just to confirm, is Hyper-V your sandbox VM? I used ESET to scan the files I torrented, but they look very suspicious from virustotal, but I don't really know how to parse the info - knowing if it is a false positive/etc.

[-] USSEthernet@startrek.website 2 points 8 hours ago

Hyper-V is the hypervisor that the VM runs on. Yeah I don't really know which malware scanners are the go to ones anymore. Just figure if I can get it to pass through 2 different ones ok then it's probably ok. I'm sure there's some other good ones out there. I've heard of ESET and virustotal, but I'm not familiar.

[-] Yourname942@lemmy.dbzer0.com 2 points 11 hours ago

How would I know if there was hidden spyware/malware if I ran it in a VM? (if they are smart they try to be undetected)

[-] whats_a_lemmy@midwest.social 4 points 11 hours ago

You don't, but if someone figured out how to do a VM escape surely they would have bigger aspirations than some random torrent

[-] Yourname942@lemmy.dbzer0.com 1 points 11 hours ago* (last edited 11 hours ago)

I mean yeah that makes sense, but I don't know enough about torrenting (nor tech in general) to know if something is safe/trustworthy sadly.. I feel like I'm probably better off spending several hundreds on a subscription, than more likely than not be hacked/get advanced spyware. I doubt they wouldn't prey on dumb people like me if it is easy. If I was more knowledgeable it would probably be possible to manually remove infected bits of a torrented file to make it work, but idk.

[-] pirateKaiser@sh.itjust.works 5 points 9 hours ago* (last edited 9 hours ago)

If you find torrenting and running a VM too technical, I'm sorry to say you're better off not trying to identify and remove any malicious code.

Don't put yourself down and waste your money, you can get over the learning curve for this, it's not that steep.

To elaborate, as the previous reply stated, running the cracked programs inside a virtual machine allows you to isolate an environment specifically for this usage. Configured properly (another reply went into more detail here), even if the cracked software has something malicious, it can't harm you. So you can safely ignore wether there's a virus or not.

[-] Yourname942@lemmy.dbzer0.com 2 points 8 hours ago

Thank you for the info, and for the encouragement. Yeah I am definitely going to try using a VM to diagnose the files more closely. To confirm, is a VM, (such as Hyper-V) similar to Windows Sandbox, where it effectively resets itself (new slate) each time you open it? Or can I install the torrented files in the VM and still access it if I close and reopen the VM in the future?

Also, which VM would you suggest? I apologize for appending so many questions to my original post.

[-] scoobford@lemmy.zip 14 points 14 hours ago

AFAIK, you don't. You might be able to validate the actual software package's hash against official sources, but the crack won't validate because it's different from the unedited files.

That's why picking a site and uploader you know is important. You're kind of just hoping for the best.

[-] Yourname942@lemmy.dbzer0.com 2 points 14 hours ago* (last edited 13 hours ago)

I mean, is it safe to assume that the torrent from megathread > monkrus > uztracker is safe? I've read that you either go genp or monkrus for less chance of malware.

Alternatively, do you think splitting the 37.5GB file into 650MB pieces and then scanning with virustotal would do much good?

[-] scoobford@lemmy.zip 5 points 13 hours ago

M0nkrus is probably safe, that's why people recommend them so frequently.

I lack the technical knowledge to say whether splitting the file to scan would work or not, but I suspect not.

[-] frongt@lemmy.zip 14 points 14 hours ago

Validate the checksum against the official sources.

[-] Yourname942@lemmy.dbzer0.com 4 points 13 hours ago* (last edited 13 hours ago)

Wouldn't it be different since non-official versions are cracked? I'm also not really sure how I would even do so for that plugin since it is a subscription, nor how to do so for the master collection, because it technically does not exist officially.

[-] dastanktal@hexbear.net 4 points 13 hours ago

Just run the file against clamav, and you should be able to tell whether or not it's got issues. That's generally what's done in commercial spaces.

[-] Yourname942@lemmy.dbzer0.com 1 points 11 hours ago

Thank you for the advice. Is clamav just another antivirus software?

[-] dastanktal@hexbear.net 3 points 11 hours ago

Yes, it's open source antivirus software.

The entire internet practically runs on what these guys do.

https://www.clamav.net/

It has a tool that you can use to scan whatever binary you want and it'll tell you whether or not it's a virus which fits what you need to do

[-] Yourname942@lemmy.dbzer0.com 1 points 10 hours ago

Oh okay, thanks. I don't know how it compares with Eset for example. My antivirus said the files were clean, but the virustotal results are really sketchy.

[-] dastanktal@hexbear.net 2 points 9 hours ago

It's not like traditional antivirus software, it just includes a tool that you can use to manually scan files to see if it has a virus signature, which is all Eset and most virus scanners are doing on the backend. They're also doing what's called heuristics, which is where they're using predictive modeling to try and identify if a program has what they call an attack signature. This does result in false positives, just so you're aware.

All virus total is doing is running a bunch of virus engines like eset and clamav on the back end to see if it triggers anything.

If both your virus software and clamav comes back clean, then I'd trust it.

[-] Yourname942@lemmy.dbzer0.com 1 points 8 hours ago

Would you trust it if the detection is 0, but there are network connections? (contacted domains and contacted IP addresses)

[-] dastanktal@hexbear.net 1 points 2 hours ago

A lot of the time these apps will have heuristics that will reach back out and so you will see network connections occasionally.

Without knowing more about this application, I don't have the right context to evaluate whether or not I would trust something like that, so it's gonna be up to your comfort level. But, if clamav came back clean and so did your other virus software, I would assume it's not malicious traffic.

[-] rulray@lemmy.dbzer0.com 4 points 13 hours ago* (last edited 13 hours ago)

What about installing some antivirus than can scan on demand?

I don't know how's the "market" right now, but a few years ago Malwarebytes was good for Windows, and ClamAV in Linux

[-] Yourname942@lemmy.dbzer0.com 1 points 11 hours ago* (last edited 11 hours ago)

I ran my antivirus on the plugins.zip folder and it didn't detect anything. Then I ran it on the master collection folder, and it also didn't detect anything, but it suspiciously finished almost immediately although it does only contain the iso (37.5GB), .info file (2.46KB), .sha (85B), .md5 (77B), so I'm not sure. Also, I just posted the virustotal results in this thread.

[-] Cevilia@lemmy.blahaj.zone 3 points 11 hours ago

You may have to mount the iso first before a virus scanner would scan it. Which I would advise against doing on a machine you care about. And even then, it might not scan the suspect files anyway, a lot of scanners will only check files with certain extensions.

Otherwise you could just run it in a virtual machine with no network connections and see if anything sus happens. But it might not happen right away, or it might detect the VM and not trigger any malware.

These are ways you can gather information to make an informed decision, but ultimately you may just have to decide whether you trust the source enough to roll the dice. Only you can make that decision.

[-] Yourname942@lemmy.dbzer0.com 1 points 8 hours ago

If I use the VM with no network connections, is there any way for me to manually find malware hidden in the files? I'm not really sure what to look for specifically. I definitely want to try using a VM to more closely inspect the files

[-] Cevilia@lemmy.blahaj.zone 1 points 3 hours ago

This is way outside of my expertise. I'm not sure you'd find anything VirusTotal's behaviour checks didn't find, anyway. Usually, if I'm at all unsure, I just won't run it.

[-] bjoern_tantau@swg-empire.de 1 points 12 hours ago
[-] Yourname942@lemmy.dbzer0.com 2 points 11 hours ago

This was the result: https://imgur.com/a/5rEpIga I'm not sure if that means that it is safe/unsafe, but it seems extremely suspicious.

this post was submitted on 15 Aug 2025
30 points (91.7% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

63502 readers
720 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):

🏴‍☠️ Other communities

FUCK ADOBE!

Torrenting/P2P:

Gaming:


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 2 years ago
MODERATORS