B
Bear Bottoms
Also, unless you you specified in the interface to delete the files,
the files that were flagged are still in their original locations.
Of course I didn't and of course they are.
Also, unless you you specified in the interface to delete the files,
the files that were flagged are still in their original locations.
From: "Bear Bottoms said:I sent you via your gmail a link to the zip file that contained the well
known files like notepad.exe, 7zip.exe, etc. which your program alerted to
as malware. None of these are malware, and if you have a white list as you
say you do, why isn't at the least notepad.exe on it and why is your
program alerting on one of the most common Windows programs as malware?
I'm just sayin....
Fine-I didn't define parameters or intend to in my example-there is aYou can NOT whitelist based solely on a name such as; calc.exe and notepad.exe!
I have seen *numerous* examples named that way to obfuscate their malicious intent. Often
using the legitimate utility icon. But, Microsoft does not UPX pack its executables so
there is the first clue it is malicious.
From: "Bear Bottoms said:Fine-I didn't define parameters or intend to in my example-there is a point...my
question stands as to why notepad.exe (which I know is a legitimate Windows file) is
alerted on.
I'm just sayin...
To clarify the problem to this, I don't whitelist based solely on
filenames alone, which is silly. The blacklist and whitelist focus
around hash values, which can potentially create a problem if there is
a hash collision. This is why at the time of this post there are
technically 11 databases, however only 8 are currently implemented at
this point in time, which are the following:
Malware Blacklist Database - MD5 based
(http://www.tot-ltd.org/blacklist/0-F/0000-FFFF)
System Whitelist Database - MD5 based
(http://www.tot-ltd.org/whitelist/0-F/0000-FFFF)
Default Malware Install Path Database - Self-explanatory, checked
against both black and whitelist.
(http://www.tot-ltd.org/installation.db)
Default Trojan Port List - Checks active ports and programs against a
port list
(http://www.tot-ltd.org/ports/)
API Based Heuristics - Self-explanatory
(http://www.tot-ltd.org/API)
User Definable Heuristics - Antiquated method of heuristics, but still
used for general purpose, non-api related heuristics
Downloaded from http://www.tot-ltd.org/heuristics.dat
Parental Control Scan Database -
Included in installation as offensive.dat
Executable Packer Database - Contains several thousand headers for
different executable packers
http://www.tot-ltd.org/packer.db
Usually, when/if a false positive comes up, it's usually a piece of
malware that implements (sometimes modified) components from third
party applications or a non-system critical file that would usually be
listed as greyware. MW.GEN is a sign that I use in the blacklist
database for definitions from google's malware blacklist. I also use
ClamAV.net's database, in addition to any other site that makes
searchable copies of their databases online. I do not discriminate
when it comes to information harvesting, but I generally try to do my
best to verify that the information that I collect is indeed viable
via cross-referencing hashes, and checking directly against my own
personal malware archive. This is how I maintain the blacklist.
The whitelist consists solely of hashes used from http://www.nsrl.nist.gov/
, and known, clean install discs for various flavors of windows. A
similar method is implemented to the one illustrated above. Why the
application components in question tested positive? I can't tell you
right offhand. It could be any number of reasons. What I can say, is
that perhaps we have two different versions of notepad. I'm running
Windows XP 32 bit, which may differ from your version of notepad on
Vista, depending on if you run 32 or 64-bit. All I can tell you at
this point is that I know the version of notepad that's on my system
doesn't throw any flags, nor have any of the other systems that I've
tested it on, including one install of Vista 32bit. The reason I
don't have every commercial application whitelisted is because I
simply don't have the time, resources, or hard drive space to do that
with at this point in time, even with 1TB of space at hand.
Honestly, I won't know until I take a good look at them and know for
sure. However, given the fact that I already work a primary job
nearly 40 hours a week, do a lot of paid freelance work (add ~20+
hours/week for that), in addition to helping raise a family, it might
take me a day or two until the problem (if there is one to be found)
can be fixed. Nevermind the fact that I don't even make money off of
this project at all. Ironically, the server averages around 300000
hits per month. A full 2/3 of the traffic is almost entirely centered
around either the database entries themselves, or downloading of the
free version of the malware scanner, or any of the other projects that
are up and running. I can also post screenshots to prove these
claims, if there is any question of legitimacy. The only reason I
mention this last part is to illustrate exactly what kind of time
schedule I have to work with, and the sheer volume of traffic volume
that is processed on an almost daily basis.
I'm not saying that the false positive claims are legit or a hoax. I
won't know for sure, but if there is an issue within the database
itself that needs resolved, I'll do my best to have it done within
24-48 hours. I don't have anyone hired to do this stuff, I do it on
my own. I only ask that you be patient.
Sincerely,
Erick
http://www.tot-ltd.org