Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Minishift detected as malware #2914

Closed
sobkowiak opened this issue Oct 22, 2018 · 18 comments
Closed

Minishift detected as malware #2914

sobkowiak opened this issue Oct 22, 2018 · 18 comments

Comments

@sobkowiak
Copy link

sobkowiak commented Oct 22, 2018

General information

  • Minishift version: 1.25.0
  • OS: Windows
  • Hypervisor: VirtualBox

Steps to reproduce

  1. Invoke any command using minishift

Expected

Command successfully invoked

Actual

Each time following window is opened by Symantec

grafik

It looks like the latest executable is no more signed

grafik

The previous versions were signed by Red Hat

grafik

The executable is now detected as malware. I have got following email from my security department

SOC team noticed Command and Control domain ummydownloader.com detected for user : ksobkowi and last ip address of system is 10.42.16.43

PFB details of malicious connection.

Endpoint : CE16231

Malicious Files
File Name : minishift.exe
Path : c:\trainings\ocp
Certificate : Not Available
Blocked : No

SOC recommendations:

Kindly contact onsite support team to delete the malicious file and perform below actions:

- Make sure  system has updated with latest Antivirus Signature and Version  
- Make sure system has updated with latest Microsoft patches.
- Remove malicious software’s from system if any.
- Run full system scan and make sure there is no infection.

Was it intended that the executable is no more signed?

@gbraad
Copy link
Member

gbraad commented Oct 22, 2018

Can you provide the SHA1 and download location of this binary?

@gbraad
Copy link
Member

gbraad commented Oct 22, 2018

#2911, #2912, #2913 are duplicates

@sobkowiak
Copy link
Author

Downloaded from https://github.com/minishift/minishift/releases/download/v1.25.0/minishift-1.25.0-windows-amd64.zip

SHA1:

9abed6c6ef0d59cf6c6e9b41dbcf313a622c697a *minishift-1.25.0-windows-amd64.zip

@anjannath
Copy link
Member

anjannath commented Oct 22, 2018 via email

@sobkowiak
Copy link
Author

I have downloaded from this url https://github.com/minishift/minishift/releases/download/v1.25.0/minishift-1.25.0-windows-amd64.zip

Here the sums

ksobkowi@CE16231 MINGW64 /c/trainings/ocp
$ sha256sum.exe minishift-1.25.0-windows-amd64.zip
256fc7e039234ba34e15cb18837f054c9e2239aff81cd34af9cb4ca44f07eaf6 *minishift-1.25.0-windows-amd64.zip

ksobkowi@CE16231 MINGW64 /c/trainings/ocp
$ sha1sum.exe minishift-1.25.0-windows-amd64.zip
9abed6c6ef0d59cf6c6e9b41dbcf313a622c697a *minishift-1.25.0-windows-amd64.zip

@praveenkumar
Copy link
Contributor

@sobkowiak Also what I am suspecting is, you used to use CDK (downstream product) (https://developers.redhat.com/products/cdk/download/) which have signed binary from Red Hat side and you shift to upstream minishift.

@sobkowiak
Copy link
Author

My screenshot was for oc, not minishift. But there is still a problem that 1.25.0 is detected as malware, but the older versions not

@praveenkumar
Copy link
Contributor

@sobkowiak we didn't change anything in the process for creating the binary, that is done using the CI, not a manual process, oc binaries are still signed as usual and older version of minishift is also not signed so I am not sure why Symantec doesn't show same with the older version.

@gbraad
Copy link
Member

gbraad commented Oct 23, 2018 via email

@gbraad
Copy link
Member

gbraad commented Oct 23, 2018

The sha is identical with https://github.com/minishift/minishift/releases/download/v1.25.0/minishift-1.25.0-windows-amd64.zip.sha256

This binary was produced in and uplodaed from a clean environment (CI). it would seem unlikely something got added in the process. i have not been able to find anything.

@gbraad
Copy link
Member

gbraad commented Oct 27, 2018

Please collect findings here, @gh0st.

It seems #2948 Trend Micro reports it as Ransomware

@gbraad
Copy link
Member

gbraad commented Oct 27, 2018

Perhaps this is related to the intermediate proxy functionality we added

This indication happened after the v1.24 release.

@LalatenduMohanty
Copy link
Member

@gh0st @sobkowiak Can you check if you are seeing the same issue with 1.26.1 version of Minishift https://github.com/minishift/minishift/releases/tag/v1.26.1

@anjannath
Copy link
Member

@gh0st Which trend micro product do you use, is their free RansomBuster or is it one of the generic anti virus/network security product?

@anjannath
Copy link
Member

anjannath commented Oct 30, 2018

@sobkowiak So in order to find out why it is been flagged as unsafe, i installed Endpoint Protection Manager and exported the client binary and installed in the same system, but i did not get any warning or error. [Screen-shots are attached]
ep
ep_manager
posh_minishift

I guess this might be related to some custom policies that your organization have, in order to debug this further please provide us with more details, maybe also scan that binary in virustotal.com to eliminate any false positives.

The version of Endpoint Protection Manager i tried was: 1.14.1023.0100 you can get the version by launching Symantec Endpoint Protection -> then click on Help -> Click on About
and the definitions are of 10/29/18r7

@anjannath
Copy link
Member

@sobkowiak Are you able to run minishift without any issues now? please let us know the version of endpoint protection that flagged it as malware.

@anjannath
Copy link
Member

@gh0st We have filed a reclassification request to trend micro, they haven't replied to us yet, but i'd suggest you to also file a reclassification request.

@stale
Copy link

stale bot commented Jan 16, 2019

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@stale stale bot added the status/stale label Jan 16, 2019
@stale stale bot closed this as completed Feb 7, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants