{"id":3053,"date":"2020-03-22T09:32:27","date_gmt":"2020-03-22T08:32:27","guid":{"rendered":"https:\/\/kudzia.eu\/b\/?p=3053"},"modified":"2020-03-22T09:41:45","modified_gmt":"2020-03-22T08:41:45","slug":"fighting-a-false-positive-flagging-by-multiple-antivirus-vendors","status":"publish","type":"post","link":"https:\/\/kudzia.eu\/b\/2020\/03\/fighting-a-false-positive-flagging-by-multiple-antivirus-vendors\/","title":{"rendered":"fighting a false-positive flagging by multiple antivirus vendors"},"content":{"rendered":"<p>recently i woke up to this: &#8220;Hi, some of our employees are using your application. This morning they have received an upgrade notification (in yellow banner) to get the latest version of your app. Our anti-virus\/malware has triggered on your module called &#8220;somefile.exe&#8221; detected at risk being a &#8220;Trojan.Gen.MBT &#8220;. below few resources that i&#8217;ve found useful in going from https:\/\/virustotal.com reporting 25 different vendors flagging our application as a virus to just 1.<\/p>\n<p><!--more--><\/p>\n<p>first interesting tidbit: somefile.exe is small win32 binary compiled from c++ code using visual studio. to be on the safe side we&#8217;ve re-compiled it on a clean machine, it was still recognized as a threat &#8211; so we ware sure it&#8217;s not an elaborate attack on our build infrastructure. we want one step further and stripped all of the code leaving just this:<\/p>\n<pre class=\"brush: plain; title: ; notranslate\" title=\"\">\r\n#include &quot;framework.h&quot;\r\n#include &quot;Project2.h&quot;\r\n\r\nint APIENTRY wWinMain(_In_ HINSTANCE hInstance,\r\n                     _In_opt_ HINSTANCE hPrevInstance,\r\n                     _In_ LPWSTR    lpCmdLine,\r\n                     _In_ int       nCmdShow)\r\n{\r\n}\r\n<\/pre>\n<p>guess what &#8211; it&#8217;s detected by <a href=\"https:\/\/www.virustotal.com\/gui\/file\/76109f5feea79b765a704bfceec6ebd51a0584ced83b3f805ffa71978abcefe5\/detection\">15 anti-virus vendors as a threat<\/a>. or maybe i should write snake-oil sales people?<\/p>\n<p>i&#8217;ve started contacting different av vendors. most did not respond but there was a reaction &#8211; within few days ~ half of them stopped flagging that particular exe as a threat. since &#8216;forever&#8217; we&#8217;ve been digitally signing installer of our application and each msi \/ msp file. i&#8217;ve found a <a href=\"https:\/\/www.reddit.com\/r\/sysadmin\/comments\/d19zml\/mcafee_requiring_a_grant_number_to_sign_up_to\/\">reddit thread<\/a> suggesting that it&#8217;s worth signing individual binaries too. this helped, but it&#8217;s scary: mere presence of valid digital signature does not tell much about lack of maliciousness of a file.<\/p>\n<p>some of the AV vendors started to respond &#8211; notably TrendMicro suggested that we should notify them whenever we change a signing certificate &#8211; which means that they&#8217;ve added custom weights or white-listed the particular cert that we use currently.<\/p>\n<p>McAfee still recognizes new builds of our application but has a white-listing process for each release that we&#8217;ll follow.<\/p>\n<p>some resources that ware helpful:<\/p>\n<ul>\n<li>av scanner aggregators:\n<ul>https:\/\/www.virscan.org\/language\/en\/<\/ul>\n<ul>https:\/\/www.virustotal.com\/<\/ul>\n<ul>https:\/\/metadefender.opswat.com\/<\/ul>\n<ul>https:\/\/virusscan.jotti.org\/en-US\/scan-file<\/ul>\n<\/li>\n<li>compilations of contact urls\/e-mails to different av vendors:\n<ul>https:\/\/www.techsupportalert.com\/content\/how-report-malware-or-false-positives-multiple-antivirus-vendors.htm<\/ul>\n<ul>https:\/\/www.opswat.com\/blog\/what-do-i-do-if-engine-detects-my-safe-file-threat<\/ul>\n<ul>https:\/\/www.autohotkey.com\/boards\/viewtopic.php?t=62266<\/ul>\n<ul>http:\/\/straighttips.blogspot.com\/2019\/12\/virustotal-report-false-positives.html<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>recently i woke up to this: &#8220;Hi, some of our employees are using your application. This morning they have received an upgrade notification (in yellow banner) to get the latest version of your app. Our anti-virus\/malware has triggered on your module called &#8220;somefile.exe&#8221; detected at risk being a &#8220;Trojan.Gen.MBT &#8220;. below few resources that i&#8217;ve [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[107],"class_list":["post-3053","post","type-post","status-publish","format-standard","hentry","category-tech","tag-antivirus"],"_links":{"self":[{"href":"https:\/\/kudzia.eu\/b\/wp-json\/wp\/v2\/posts\/3053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kudzia.eu\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kudzia.eu\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kudzia.eu\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kudzia.eu\/b\/wp-json\/wp\/v2\/comments?post=3053"}],"version-history":[{"count":13,"href":"https:\/\/kudzia.eu\/b\/wp-json\/wp\/v2\/posts\/3053\/revisions"}],"predecessor-version":[{"id":3068,"href":"https:\/\/kudzia.eu\/b\/wp-json\/wp\/v2\/posts\/3053\/revisions\/3068"}],"wp:attachment":[{"href":"https:\/\/kudzia.eu\/b\/wp-json\/wp\/v2\/media?parent=3053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kudzia.eu\/b\/wp-json\/wp\/v2\/categories?post=3053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kudzia.eu\/b\/wp-json\/wp\/v2\/tags?post=3053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}