Skip to content

Commit d7bd259

Browse files
committed
Fix a few typos in the post
1 parent d071819 commit d7bd259

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

site/blog/mistaken-for-malware/index.md

+5-6
Original file line numberDiff line numberDiff line change
@@ -60,11 +60,11 @@ To my utmost surprise, that check was positive — BitDefender Theta thought it
6060
That immediately smelled like a false positive to me. First, no other vendor detected anything, not even BitDefender's other product.
6161
Nonetheless, I carefully looked at the output of `strace` for soupault 4.6.0 running on a clean VM — there were no system calls I wouldn't expect,
6262
certainly no network connections to a C&C server. I downloaded samples of actual Mirai executables and compared `strings`, `objdump -d` and `hexdump` listings just to be sure —
63-
there certainly wasn't anything like that in my executables. Mirai that samples I could find used `wget | sh` to fetch their "updates".
64-
Soupault executables didn't contain any domain names other than soupault.app (in its help messages and default configs), and there was no code that could make network connections.
63+
there certainly wasn't anything like that in my executables. Mirai samples that I could find used `wget | sh` to fetch their "updates".
64+
Soupault executables didn't contain any domain names other than soupault.app (in help messages and default configs), and there was no code that could make network connections.
6565

6666
I assumed that the BitDefender mis-detection was a likely cause of the domain block, so I decided to try some options to make the Linux executable pass the check.
67-
I found that when I ran `strip` on it, it was no longer detected as malware. That was also the final confirmation that it was false positive — whatever caused BitDefender Theta
67+
I found that when I ran `strip` on it, it was no longer detected as malware. That was also the final confirmation that it was a false positive — whatever caused BitDefender Theta
6868
think it was infected, it wasn't even in the ELF sections that actually determined program's behavior.
6969

7070
I intentionally distribute soupault executables unstripped so that users can get informative exception traces if there are any bugs that lead to unhandled exceptions.
@@ -85,7 +85,6 @@ I sent them a detailed report on my findings, you can find a copy of it in the [
8585
I received a reply within the same day from them.
8686

8787
<blockquote>
88-
Jun 22, 2023, 13:37 UTC
8988
Hello Daniil,
9089

9190
Thanks for contacting Quad9 support.
@@ -131,7 +130,7 @@ I had to resort to contacting VirusTotal, which has a contact form on the websit
131130

132131
<img src="virustotal_contact_form.png" alt="VirusTotal contact form">
133132

134-
I made it very clear that I understand that VirusTotal is just an aggregator and isn't responsible for false positives, and I asked them to either communicate
133+
I made it very clear that I understood that VirusTotal was just an aggregator and wasn't responsible for any false positives, and I asked them to either communicate
135134
my findings to BitDefender or point me to their contact information. They shared a list of vendors' virus submission email addresses with me,
136135
so finally I could send my report to BitDefender.
137136

@@ -140,7 +139,7 @@ Well, better than nothing, I suppose.
140139

141140
<h2 id="guild-by-association">Guilt by association?</h2>
142141

143-
While poking around VirusTotal, I discoverd that for registered users, it has a "Graph" feature. The graph for soupault.app shows an association
142+
While poking around VirusTotal, I discoverd that, for registered users, it has a "Graph" feature. The graph for soupault.app shows an association
144143
with its IP address, which belongs to Google Cloud Platform (where Netlify hosts its web servers), and has a history of detections as malicious.
145144

146145
<img src="virustotal_graph.png" alt="VirusTotal graph page for soupault.app, showing its IP address in Google Cloud, with a history of malware detections">

0 commit comments

Comments
 (0)