-
Notifications
You must be signed in to change notification settings - Fork 206
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
VirusTotal reports some detections in etwpackage1.58.zip #164
Comments
This change removes one of the files: I'm not convinced that the reports are real so, absent more information, this is all that I will be doing. |
checked the new version, same detections: red files indicate detection: 214b00ec64d6999957554828b86d0232f92860a6358ae5c6ad5b48a825dde361 |
I'm not convinced the reports are real. In particular note that the detections aren't really "the same" because before ETWEventDemo_deb64.exe was flagged as malicious and that file doesn't even exist anymore. Meanwhile ETWProviders.dll was "fine" before but is now suspicious but when I compared the disassemblies between the two versions I saw few differences and none that looked plausibly malicious. I think these are false positives. Absent more information it's not even clear that there is anything that I can do. |
Hmm, apologies. I meant same "crowsourced sigma rules". Detection rule:
Thanks though for looking into it & quickly making releases. |
If any of these detections are accurate then it's a very serious problem, especially since it implies that the machine where I am doing these builds is infected with something. Whether it's Floxif Trojan or anything. But, I am skeptical about these reports. And, VirusTotal's reports are not the slightest bit clear about what the information means or how to validate it. That's why I feel like I have no choice but to ignore these. I can't tell what the latest comment is saying. Did something patch symsrv.dll to make it malicious? If so, what? |
@randomascii Application: wpa.exe Bear in mind this is a company machine and as such there is a virus defense setup which I cannot disable easily. |
You're seeing a WPA issue rather than a UIforETW issue. It looks like some sort of install problem so I would try resolving it yourself because it is likely that others cannot help you. You could always move the traces to another machine - they don't need to be resolved on the machine they are recorded on. Even a VM could work. For further discussion please open a new issue rather than repurposing an unrelated issue. |
https://www.virustotal.com/gui/file/e9b723d24ba5435b0185526e1185d42064f7a3c6832820e73a75cf7c10bb4518/detection
Please mitigate these detections:
Google: Detected
Ikarus: Trojan.Win32.Swrort
1-Matches rule Floxif Trojan by Ariel Millahuel at SOC Prime Threat Detection Marketplace
2-Matches rule Password Protected Compressed File Extraction Via 7Zip by Nasreddine Bencherchali (Nextron Systems) at Sigma Integrated Rule Set (GitHub)
3-Matches rule Creation of an Executable by an Executable by frack113 at Sigma Integrated Rule Set (GitHub)
The text was updated successfully, but these errors were encountered: