Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

commit 6248829 BLUESPAWN-client-x86-Release build detected as TrojanDownloader:Win32/Cekar.gen!A by Defender #385

Open
keimiller-expediagroup opened this issue Sep 11, 2020 · 5 comments
Labels

Comments

@keimiller-expediagroup
Copy link

Just a heads up. VT score of 3/68. Likely a false positive due to incorporation of Atomic tests. Given the value of this project though, it would be good to engage with the DATP team to address the (suspected) false positive. Thanks.

@ION28
Copy link
Owner

ION28 commented Sep 19, 2020

Thanks for letting us know. We'll try to reach out to them

@ION28
Copy link
Owner

ION28 commented Sep 20, 2020

@keimiller-expediagroup I don't have a timeframe when this will be addressed and a release build published, but we are going to begin the process of obtaining an EV, cross-signed by Microsoft certificate in the coming months. This should address the flagged as malware issue. Thank you again for the report - I'll leave this open until we get BLUESPAWN builds signed.

@keimiller-expediagroup
Copy link
Author

Excellent, thank you. I'll defer to you if you want to keep this issue open or track remediation another way. FWIW I've noticed Defender (SCEP) throw a number of FP's on evtx from sbousseaden/EVTX-ATTACK-SAMPLES suggesting these detections are strings matching only.

@brinhosa
Copy link

In the last released version, 41 security vendors and 1 sandbox flagged this file as malicious. Do you know what happened?
https://www.virustotal.com/gui/file/837b6d827746b9201ec8623008c9e69f3ece532c65484aee169f1ee9f5b8f245/behavior/C2AE

@ION28
Copy link
Owner

ION28 commented May 26, 2022

Hi @brinhosa! Thanks for the bump. It's due to the yara rules that get added to the binary so BLUESPAWN can detect malware with them.

Jack has a fix for this in the develop branch. Hopefully we'll be able to make an updated release to master soon.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants