You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: site/blog/mistaken-for-malware/index.md
+5-6
Original file line number
Diff line number
Diff line change
@@ -60,11 +60,11 @@ To my utmost surprise, that check was positive — BitDefender Theta thought it
60
60
That immediately smelled like a false positive to me. First, no other vendor detected anything, not even BitDefender's other product.
61
61
Nonetheless, I carefully looked at the output of `strace` for soupault 4.6.0 running on a clean VM — there were no system calls I wouldn't expect,
62
62
certainly no network connections to a C&C server. I downloaded samples of actual Mirai executables and compared `strings`, `objdump -d` and `hexdump` listings just to be sure —
63
-
there certainly wasn't anything like that in my executables. Mirai that samples I could find used `wget | sh` to fetch their "updates".
64
-
Soupault executables didn't contain any domain names other than soupault.app (in its help messages and default configs), and there was no code that could make network connections.
63
+
there certainly wasn't anything like that in my executables. Mirai samples that I could find used `wget | sh` to fetch their "updates".
64
+
Soupault executables didn't contain any domain names other than soupault.app (in help messages and default configs), and there was no code that could make network connections.
65
65
66
66
I assumed that the BitDefender mis-detection was a likely cause of the domain block, so I decided to try some options to make the Linux executable pass the check.
67
-
I found that when I ran `strip` on it, it was no longer detected as malware. That was also the final confirmation that it was false positive — whatever caused BitDefender Theta
67
+
I found that when I ran `strip` on it, it was no longer detected as malware. That was also the final confirmation that it was a false positive — whatever caused BitDefender Theta
68
68
think it was infected, it wasn't even in the ELF sections that actually determined program's behavior.
69
69
70
70
I intentionally distribute soupault executables unstripped so that users can get informative exception traces if there are any bugs that lead to unhandled exceptions.
@@ -85,7 +85,6 @@ I sent them a detailed report on my findings, you can find a copy of it in the [
85
85
I received a reply within the same day from them.
86
86
87
87
<blockquote>
88
-
Jun 22, 2023, 13:37 UTC
89
88
Hello Daniil,
90
89
91
90
Thanks for contacting Quad9 support.
@@ -131,7 +130,7 @@ I had to resort to contacting VirusTotal, which has a contact form on the websit
I made it very clear that I understand that VirusTotal is just an aggregator and isn't responsible for false positives, and I asked them to either communicate
133
+
I made it very clear that I understood that VirusTotal was just an aggregator and wasn't responsible for any false positives, and I asked them to either communicate
135
134
my findings to BitDefender or point me to their contact information. They shared a list of vendors' virus submission email addresses with me,
136
135
so finally I could send my report to BitDefender.
137
136
@@ -140,7 +139,7 @@ Well, better than nothing, I suppose.
140
139
141
140
<h2id="guild-by-association">Guilt by association?</h2>
142
141
143
-
While poking around VirusTotal, I discoverd that for registered users, it has a "Graph" feature. The graph for soupault.app shows an association
142
+
While poking around VirusTotal, I discoverd that, for registered users, it has a "Graph" feature. The graph for soupault.app shows an association
144
143
with its IP address, which belongs to Google Cloud Platform (where Netlify hosts its web servers), and has a history of detections as malicious.
145
144
146
145
<imgsrc="virustotal_graph.png"alt="VirusTotal graph page for soupault.app, showing its IP address in Google Cloud, with a history of malware detections">
0 commit comments