-
-
Notifications
You must be signed in to change notification settings - Fork 150
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Virusdetection on mob.exe #357
Comments
However, you might want to scan your system for further "Script/Wacatac.H!ml". Since your system detected it on your mob.exe, but VirusTotal which also uses BitDefender did not. |
I made a false positive report on the BitDefender Site with the Link to this Archive: |
Tried reporting Kaspersky, but they found nothing https://opentip.kaspersky.com/5E1BC52F7811C3C95A5D8872A6868F975FFC8F81B00B6DFBF3A8B5449110FE44/results?tab=upload |
I released v4.2.0 and its flagged by 5 Vendors including Kaspersky Again I submitted a false positive report on Kaspersky, but their Threat Intelligence Portal analyzed the File for 3 minutes and says its clean ... I'm confused. https://support.kaspersky.com/common/error/other/1870#:~:text=If%20you%20suspect%20a%20false,reanalyze%20on%20the%20results%20page. |
Thank you @soulpatch |
The actual version of mob looks better again. Just three less used scanners flagged it. https://www.virustotal.com/gui/file/a38b60335beeace00264405589321adb9666148c2a18c44bb90aca0625dc7ef7 I reached out to cylance and told them about the false positive. Waiting for response now. One thing we could do is to add a virus total build step to our release and use the vt monitor to announce our executables to virustotal. This could prevent false positives. |
Any update on this @hollesse? More vendors are classifying mob as malicious (note note that the following hash pertains to the Windows v4.4.2 executable): I think I've identified some of the suspicious components of the executable. Please get in touch over email if you'd like to discuss this. |
@jakewilliami I just sent you an email :) |
Hey @jakewilliami could you please email me? My mail address is [email protected] |
Hi @hollesse, so sorry that I missed this in October! I have responded to you via email. I think I've managed to identify a couple of big problems with the build. |
So I had a lot to do the last days, but I got the email from @jakewilliami and also spoke to an security and go expert in my company. To be transparent I just will share the email from @jakewilliami here.
Now let me just answer it here right away. What I think an found out. First of all I got the recommendation from one of our security experts in the company to just pack the exe with UPX Packer, as even a hello world in Go sometimes is identified as malware by some anti virus detection applications. Thats something we should try and which could maybe help with the creation time of the exe and also with the software packing issues and the PE file. Some other things that come to my mind is the feature that the mob timer gets stopped when doing mob done. Which is done by killing the process. I think this is also something we should stop doing, as this looks like malicious behavior. The string hostname is used for timer.mob.sh maybe it makes sense to adjust it to a better name, if hostname is supisious. Where the wine emulator string come from is not clear to me. Here is futher investigation needed. I will create some Issues for the steps and link them here. |
@gregorriegler FYI |
Just found this thread. My security colleage also told me that even just a hello world in GO gets flagged by some scanners. One thing which is written in the comments is that it should have gotten worse with newer version than GO 1.16. I did update the go version from 1.15 to 1.20 on 26th may 2023. But the first hints we where getting where already before this. But at least the process killing was already done in the end of 2022 maybe this was the first hit and then the new go version adds more hits... |
I found one more thing we should change. I introduced the test package. This package is not just test code and therefore is bundled into the app. Even if it is not used. This package uses system APIs to write files etc which could also be suspicious. We should make this package test only. This small adjustment can also have an impact on the virus detection. |
updated to go 1.22 now we just have 2 vendors left. |
I'm using mob on Mac M1. I've got F-Secure running and it detected "Program.APPL/AVF.Agent.biwgu" from mob v5.1.0 bin. After some fiddling around, same finding was in mob_v5.1.0_darwin_universal.tar.gz, which of course contains that binary (downloaded by Brew). F-Secure does not whine about Mob 5.0.1 tar.gz. |
Today, my Windows BitDefender detected the trojan Script/Wacatac.H!ml in mob.exe version 4.1.2. Using the current mob.exe from https://github.com/remotemobprogramming/mob/releases/download/v4.1.2/mob_v4.1.2_windows_amd64.tar.gz and feeding the included mob.exe into www.virustotal.com leads to:
Any ideas on that?
The text was updated successfully, but these errors were encountered: